Network Security (7) Flashcards

1
Q

Which of the following types of attacks requires no computer equipment?

Denial of service

Social engineering

Brute force

A

Social engineering

Social engineering is the practice of obtaining sensitive data by contacting users and pretending to be someone with a legitimate need for that data. No computer equipment is required and no software or hardware solution can prevent it; the only way is to educate users of the potential dangers and establish policies that inform users what to do when they experience a social engineering attempt. Denial of service is a type of attack that overwhelms a computer with traffic, preventing it from functioning properly. A brute-force attack is one in which an attacker uses repeated guesses to find a password, an open port, or some other type of sensitive data. Phishing is the term for a bogus email or website designed to infect users with some type of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following best describes a brute-force attack?

An attacker breaking down the door of a datacenter

An attacker cracking a password by trying thousands of guesses

An attacker using zombie computers to flood a server with traffic

A

An attacker cracking a password by trying thousands of guesses

A brute-force attack is one in which an attacker uses repeated guesses to find a password, an open port, or some other type of sensitive data. Brute force does not refer to a physical attack. Flooding a server with traffic created by zombies is a distributed denial-of-service (DDoS) attack. Deploying an unauthorized access point is an evil twin attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An intruder has deployed a rogue access point on your company’s wireless network and is using it to access traffic generated by users who have accidentally connected to it. Which of the following is the name for this type of attack?

Evil twin

War driving

Social networking

A

Evil twin

An evil twin is a fraudulent access point on a wireless network, which an intruder can use to obtain passwords and other sensitive information transmitted by users. War driving is the term for seeking out open wireless networks. Social engineering is a form of attack in which an innocent user is persuaded by an attacker to provide sensitive information via email or telephone. Spoofing is the process of modifying network packets to make them appear as though they are transmitted by or addressed to someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A person identifying himself as Trixie from IT telephones a user called Alice and tells her that there is a problem with her network user account that could cause all her data to be lost. To resolve the problem, Trixie says that she must log on using Alice’s account and configure an important setting. All she needs to do this is Alice’s account password. This call is, of course, an elicit attempt to learn Alice’s password. Which of the following terms describes the type of attack that is currently occurring?

Man in the middle

Spoofing

Social engineering

A

Social engineering

Social engineering is the term for a type of attack in which a smooth-talking intruder contacts a user and convinces him or her to disclose sensitive information, such as account passwords. A man-in-the-middle attack is one in which an attacker intercepts network traffic, reads the traffic, and can even modify it before sending it on to the destination. Spoofing is the process of modifying network packets to make them appear as though they are transmitted by or addressed to someone else. An evil twin is a fraudulent access point on a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following can be described as wireless network hardening techniques? (Choose all correct answers.)

Encryption

Authentication

MAC filtering

Social engineering

A

Encryption

Authentication

MAC filtering

Encryption, authentication, and MAC filtering are all techniques for hardening a wireless network against attack. Social engineering is a type of attack in which an intruder contacts a user and convinces him or her to disclose sensitive information, such as account passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Despite having imposed password policies on his network, compelling users to change their passwords frequently, create passwords of a specific length, and use complex passwords, Ralph has had several reports of account penetrations. The victims of the incidents had all apparently shared a “tip” suggesting that users cycle through the names of their children, nephews, nieces, and other relatives when forced to create new passwords, changing letters to numbers as needed. Which of the following actions can Ralph take to remedy the situation without creating a larger problem?

Distribute a list of common passwords that are insecure, such as those based on names, birth dates, etc.

Modify the password policies to force users to change passwords more frequently

Assign the users long passwords consisting of random-generated characters and change them often

A

Distribute a list of common passwords that are insecure, such as those based on names, birth dates, etc.

There are no policies that can prevent users from creating easily guessed passwords. The only action that can help is to educate users of the fact that attackers are frequently able to guess passwords by using information such as familiar names and dates. Forcing more frequent password changes would not compel users to alter their method for choosing passwords, nor would increasing the password history value. Assigning random passwords would address the issue, but user complaints and forgotten passwords would likely create greater problems than it would solve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following devices are likely to have default credentials configured into them that attackers might know? (Choose all correct answers.)

Wireless access points

Windows servers

Switches

Routers

A

Wireless access points

Switches

Routers

Access points, switches, and routers all require authentication to access their administrative interfaces, and most have a standard username and password configured at the factory. The purchaser can modify the default credentials, but many people fail to do so. Windows servers do not have default credentials assigned; the installer is prompted to specify an Administrator password during the setup process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One of the basic principles of network device hardening is to use secure protocols. Which of the following suggestions comply with this principle? (Choose all correct answers.)

Use SSH instead of Telnet.

Use WEP instead of WPA2.

Use TKIP instead of AES.

Use HTTPS instead of HTTP.

A

Use SSH instead of Telnet.

Use HTTPS instead of HTTP.

Secure Shell (SSH) and Telnet are both remote terminal programs, but Telnet passes instructions (including passwords) in clear text, whereas SSH is encrypted. Hypertext Transfer Protocol Secure (HTTPS) is the encrypted version of HTTP. In both of these cases, the suggested substitute is more secure. However, Temporal Key Integrity Protocol (TKIP) provides less secure encryption than Advanced Encryption Standard (AES), and Wired Equivalent Protocol (WEP) is less secure than Wi-Fi Protected Access 2 (WPA2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following wireless security protocols provides the greatest degree of network device hardening?

WEP

WPA

WPA2

A

WPA2

WPA2 is the most secure of the wireless protocols, providing the greatest degree of network device hardening. WPA was created to replace the insecure Wired Equivalent Privacy (WEP) protocol, and WPA2 was created to replace the Temporal Key Integrity Protocol (TKIP) used in the first version of WPA with Advanced Encryption Standard (AES). Extensible Authentication Protocol (EAP) is a framework for the encapsulation of authentication messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following are cryptographic algorithms used for file hashing? (Choose all correct answers.)

SHA

MD5

RC4

AES

A

SHA

MD5

Secure Hash Algorithm (SHA) and Message Digest 5 (MD5) are file hashing algorithms, used to test data integrity by calculating a hash value before transmission a file over a network. After the transmission, the receiving system performs the same calculation. If the values match, then the data is intact. RC4 and Advanced Encryption Standard (AES) are both cryptographic algorithms, but they are not used for file hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SHA and MD5 are cryptographic algorithms that are used for which of the following applications?

Data encryption

Digital signing

File hashing

A

File hashing

Secure Hash Algorithm (SHA) and Message Digest 5 (MD5) are file hashing algorithms, used to test data integrity by calculating a hash value before transmission a file over a network. After the transmission, the receiving system performs the same calculation. If the values match, then the data is intact. These two algorithms are not used for data encryption, digital signing, or wireless authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On which of the following types of devices should you consider disabling unused ports as a security precaution? (Choose all correct answers.)

Hubs

Servers

Switches

Wireless access points

A

Servers

Switches

Servers and switches are both devices on which unused ports can be a security hazard, but they use the term port differently. Servers have application layer ports that permit specific types of traffic to enter the server. Switches have ports to which administrators can connect computers and other devices. Both can provide attackers with unauthorized access to the device. It is not possible to disable hub ports, and the access points used on enterprise networks typically have only a single port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For which of the following reasons is disabling the SSID broadcast of a wireless network to prevent unauthorized access a relatively weak method of device hardening?

Attackers have ways of connecting to the network without the SSID.

Attackers can capture packets transmitted over the network and read the SSID from them.

Every access point’s SSID is printed on a label on the back of the device.

A

Attackers can capture packets transmitted over the network and read the SSID from them.

Disabling SSID broadcasts is a way of hiding the presence of a wireless network, but if an intruder knows that a network is there, it is a simple matter to capture packets transmitted by the wireless devices and read the SSID from them. It is not possible to connect to a wireless network without the SSID. SSIDs are set by the administrator of the access point; they are not printed on the device’s label. SSIDs can be found relatively easily, but guessing them is no easier than guessing a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Regularly applying operating system updates and patches to network computers is an important mitigation procedure for which of the following security problems?

Denial-of-service attacks

Malware

Social engineering

A

Malware

Operating system updates and patches are frequently released to address newly discovered exploits that make computers vulnerable to malware infestation. Applying updates on a regular basis can help to mitigate the impact of malware. Updates and patches typically cannot mitigate DoS attacks, and they have no effect on nontechnical dangers such as social engineering or dangers that apply to switches, such as port security hazards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following cannot be considered to be a server hardening policy?

Disabling unnecessary services

Disabling unused TCP and UDP ports

Upgrading firmware

A

Upgrading firmware

Upgrading the UEFI or BIOS firmware on a server typically does not enhance its security, so it cannot be considered a form of server hardening. Disabling services and ports that are not in use reduces the attack surface of a server and creating privileged user accounts reduces the chance that privileged accounts will be compromised. These, therefore, are all forms of server hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To ensure that the data received over a network is identical to the data that was transmitted, it is common for systems to run a cryptographic function on a file that generates a value called a checksum or a message digest. Which of the following terms describes this type of mechanism?

Deauthentication

File hashing

Root guard

A

File hashing

File hashing uses a cryptographic algorithm, such as Secure Hash Algorithm (SHA) or Message Digest 5 (MD5), to generate a checksum value for a file that is transmitted along with it. When the recipient applies the same algorithm to the received file, the checksum value should be the same, indicating the file has not been modified in transit. Deauthentication is a type of denial-of-service attack in which the attacker targets a wireless client by sending a deauthentication frame that causes the client to be disconnected from the network. A root guard provides protection to switch ports. Geofencing is a mechanism that is intended to prevent unauthorized clients outside the facility from connecting to a wireless network

17
Q

Which of the following are valid reasons not to disable unused switch ports? (Choose all correct answers.)

The datacenter is secured from unauthorized access.

The unused ports are not patched in to wall jacks.

The unused ports are left open to facilitate the on-boarding of new users.

The switch is configured to use a MAC-based access control list.

A

The datacenter is secured from unauthorized access.

The switch is configured to use a MAC-based access control list.

If there is no way for unauthorized people to access the datacenter, then there is no danger of someone plugging a device into a port that is left enabled. If the switch uses an access control list (ACL) that specifies the MAC addresses of systems permitted to connect to it, then there is no need to disable unused ports. However, disabling the ports is probably far easier than creating and maintaining the ACL. Ports that are not patched in can still be compromised at the switch location. Enabling ports is not difficult, so accommodating new users is not a valid reason for leaving them enabled

18
Q

Which of the following Windows password policies includes a provision to prevent users from specifying common passwords?

Maximum password age.

Minimum password length.

Passwords must meet complexity requirements.

A

Passwords must meet complexity requirements.

The “Passwords must meet complexity requirements” policy includes a provision that new passwords cannot include the user’s account name or full name. If the full name is delimited by spaces or punctuation, the individual words cannot appear in the password either. The other options do not prevent the use of common passwords

19
Q

Which of the following is not a method for hardening a wireless access point?

Upgrading firmware

Generating new keys

Deauthentication

A

Deauthentication

Deauthentication is a type of denial-of-service attack in which the attacker targets a wireless client by sending a deauthentication frame that causes the client to be disconnected from the network. It is therefore not a method for hardening an access point. Upgrading the device’s firmware to apply security fixes, changing the default administrative credentials applied at the factory, and generating new encryption keys are all means of hardening the security of an access point

20
Q

Creating a policy instructing users to avoid passwords that use commonly shared information, such as birth dates and the names of children and pets, is an example of which of the following?

Mitigation techniques

Multifactor authentication

Network hardening

A

Network hardening

Network hardening is a term used to describe any method of making it more difficult for intruders to penetrate. In many cases, network hardening techniques are based on education rather than technology. Compelling users to create passwords that are difficult to guess is one example of this. Mitigation techniques are methods for reducing the severity of an attack. Multifactor authentication calls for the use of two different identity confirmation mechanisms, such as a password and a fingerprint. Access control is a technique for creating a list of approved users or systems

21
Q

Which of the following is another term for a perimeter network?

PEAP

TKIP

DMZ

A

DMZ

A perimeter network is a segment that is separated from the internal network by a firewall and exposed to the Internet. Administrators typically use a perimeter network for servers that must be accessible by outside users, such as web and email servers. Another term for a perimeter network is a DMZ, or demilitarized zone. A virtual LAN (VLAN) is a network created within a switch. Protected Extensible Authentication Protocol (PEAP) is an authentication protocol, and Temporal Key Integrity Protocol (TKIP) is an encryption algorithm

22
Q

In some cases, network administrator create computers that function as enticing targets for attackers but that do not provide access to any legitimately sensitive services or information. Which of the following is the term used to describe this technique?

DMZ

Honeypot

Root guard

A

Honeypot

A honeypot is a computer configured to function as bait for attackers, causing them to waste their time penetrating a resource that provides no significant access. A demilitarized zone (DMZ) is the part of a network where administrators locate servers that must be accessible from the Internet. A root guard provides protection to switch ports. Spoofing is an attack technique in which an intruder modifies packets to assume the appearance of another user or computer

23
Q

After an incident in which your company’s datacenter was penetrated by an intruder, the management has installed a double doorway at the entrance to the datacenter. The two doors have a small vestibule in between them, and one door must be closed before the other one can open. Which of the following terms describes this arrangement?

Server closet

Man trap

Controlled entrance

A

Man trap

An entrance arrangement in which people must close one door before they can open the next one is called a man trap. Security personnel can evaluate potential entrants while they are in the vestibule and detain attempted intruders there

24
Q

Honeypots and honeynets belong to which of the following categories of devices?

Mitigation techniques

Network attacks

Switch port protection types

A

Mitigation techniques

A honeypot or honeynet is a type of mitigation technique that takes the form of a computer or network configured to function as bait for attackers, causing them to waste their time penetrating a resource that provides no significant access

25
Q

Metaphorically speaking, which of the following terms best describes the function of honeypots and honeynets?

Attack

Roadblock

Detour

A

Detour

Honeypots and honeynets are computers and networks designed to function as lures for attackers, in the hope that they will waste their time and resources attempting to gain access to them. Therefore, detour is the best metaphor for the function of these devices