Protecting Networks Flashcards

1
Q

CIA in network security stands for?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three things that can cause you security problems on your network:

A

Threat - internal and external
Vulnerability
Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

One example of an Exploit is called _________ where an external threat / computer tries to act like a node on your network and installs a trojan virus on your network to gain access.

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threats can cause ______________, vulnerabilities create _________ and exploits can give unauthorized users access to your network.

A

Vulnerabilities
Exploits`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this is a designed layer of security designed in a way that if a system goes down there is some other system or measure in place.

A

Defense in Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layers of the Defense in Depth are :

A

1st - perimeter first line of defense
between these 2 layers sits the: Screened Subnet or DMZ
2nd - Network layer - Network segmentation enforcement and
network access control ( separate VLANs )
3rd - Host Endpoint ( all host on your network ) update policies and
firmware
4th - Application - Test all apps
5th - Data Layer - lowest endpoint ( protecting all data ) like with
Separation of Duties or no user should be given enough rights to abuse a system by themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

these are used to lure attackers to test for vulnerabilities:

A

Honey Pots
Honey nets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______ __________ breaks the network down into subnets for improved security

A

network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_________DHCP servers can be used to perform an on-path ( man in the middle) attack

A

Rogue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If the ___ ________ is outside of the network ID, then you have a Rogue DHCP server.

A

IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To help prevent an attacker from entering your network internally, be sure to _________ any unused ports / jacks.

A

disable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This attack is designed to deny anyone service or access to a network. It’s done when you have so many people trying to access a server and they can’t, basically flooding the server all at once.

A

Denial of Service ( DoS ) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of DoS attacks include:

A

Volume Attack - Ping Flood, UDP flood, ( nothing wrong just a lot of it )
Protocol Attack - SYN Flood or SYN Attack (most common )
Application Attack - slow Loris Attack, Smurf Attack,
Amplification Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Getting a bunch of computers or BotNet to attack a single host that is a big problem today is called:

A

Distributed denial of service ( DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computers that are trying to attack servers that are called Zombies are in a group called:

A

BotNet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This attack is started when a node in a private network has been taking over and is turned into a Zombie, then turning the rest of the network into a BotNet, that then takes commands from the C&C server.

A

Command and control ( C&C or C2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

this attack is where a 3rd party intercepts data and information between a 2 party conversation and uses the information they gain to their own advantage

A

Man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Examples of ways for a Man in the Middle attack to happen are:

A

Through wireless networks (biggest problem)
Bluetooth
NFC or cell phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

this type of Man in the Middle attack is used more in wired networks and its where making something in the attackers address looks like the victims address. ( mac address or IP address or DNS address )

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When a Man in the Middle attack involves IP address stealing, is very noisy, its sending out packets to different target machines, lying to them so that their ARP caches are confused is called:

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This man in the middle attack happens when you misspell or mistype the wrong URL and get sent to another site is called:

A

URL hijacking or Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Somebody doesn’t keep the domain updated / paid and then buys it up and puts a lot of bad information on the website

A

Domain Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Things that can actually be done once you get the data or information from a man in the middle attack:

A

Replay Attack for secure communication
Downgrade attack, effects webpages
Session Hijacking - where 2 people are already in a conversation and you push out bad information to those computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Man in the Middles attacks are now called;

A

on-path attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

To help prevent a Man in the middle attack, make sure to:

A

Harden your network or make it more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

There are 2 types of “Password Attacks”:

A

Brute force -
Dictionary -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

__________ and ________policies are a great way to protect against password attacks

A

Password and Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Training __________ about possible threats is key to helping them protect their passwords.

A

users

29
Q

Two ways of VLAN hopping are:
To help prevent against these type of attacks, do not use the “native” VLAN ( only for maintenance )

A

VLAN spoofing - Cisco Dynamic Trunking Protocol (DTP) - hackers trick a switch to create a trunk link to gain access from a VLAN
Double Tagging - where a hacker modifies a data frame so it can tell the packet where to go so they can gain access. One directional

30
Q

You should manually set all your ________ ports on your switch.

A

Trunk

31
Q

This is a way to control which ports on a switch communicate with other Ports.

A

Private VLANS or Port Isolation

32
Q

________ in a VLAN can be either community ports ( ports that communicate with everyone ) or Isolated Ports ( ports cannot communicate with anyone even in their own VLAN )

A

Ports

33
Q

System Life Cycle consists of the following:

A

Asset Disposal ( IT Asset disposal or ITAD )
Using Asset Tags helps track devices

34
Q

When disposing of hard drives you would use:

A

Department of Defense (DoD) 5220.22 - M or the security Standard for wiping data

35
Q

__________ that don’t contain sensitive data can be reset to factory defaults.

A

Devices

36
Q

____________ do things to files and then propogate

A

viruses

37
Q

__________ collects keystrokes and information

A

Malware

38
Q

__________and logic bombs can devastate systems

A

Ransomware

39
Q

___________ or _________ are hard to detect.

A

Rootkit or Backdoor

40
Q

Security regarding social engineering can include:

A

Dumpster Diving
Phishing
Whaling
Shoulder Surfing
Eavesdropping
Tailgating / Piggybacking
Access control vestibule (mantrap)
Masquerading ( impersonating )

41
Q

Common vulnerabilities and exposure (CVE)

A

this is a list of publically disclosed security flaws

42
Q

CVE numbering authority or ( CNA )

A
43
Q

Zero day vulnerability is when a hacker finds a flaw before the vendor does:

A

Zero day vulnerability
Zero day exploit
Zero day attack

44
Q

Physical Security can be some of the following:

A

Motion Sensors
Asset Tags
Tamper Detection
Badge Reader
biometrics - retinal scanners, facial recognition
Smart / Secure lockers

44
Q

Protect yourself from ________ - _____ vulnerabilities by keeping systems up to date, using strong firewall configurations and educating users.

A

zero-day

44
Q

Physical controls can include:

A

*Deterrent Physical Controls _ good lighting - signage - security guard
*Preventative Physical controls - fences - barricades - K ratings
mantrap, Cabling systems - have air gaps / use VLANs, Safes, Locked cabinets, Faraday cages, locks - must have key management system in play, Workstations should have : cable locks, screen filters
*Detective tools can include - alarm systems, log files
compensating and corrective controls - are used if a control is compromised or becomes vulnerable

45
Q

A good tool for preventing against ARP poisoning is known as:

A

Cisco Dynamic ARP Inspection (DAI) - compiles a list of good known MAC and IP addresses

46
Q

this also has a list of all known DHCP servers and clients

A

DHCP snooping

47
Q

Both Cisco Dynamic ARP Inspection and DHCP snooping help with:

A

Switch Port Protection ( port security )

48
Q

A good idea to _________ any unused switch ports or unneeded network services

A

disable

49
Q

When using IPv6 routers will send out:

A

Router Advertisements ( RA ) and are used by the: Neighbor Discovery Protocol (NDP) used to detect neighbors

50
Q

You can use this tool to protect against rogue generated messages from unauthorized routers

A

IPv6 Router Advertisement (RA) guard

51
Q

You can protect against service attacks by using:

A

Control Plane policing - which uses quality of service ( QoS )to avoid denial of service ( DoS) attacks

52
Q

computers that are in a place that is not protected, are exposed but are outside of your private network

A

De-militarized Zone ( DMZ )

53
Q

A router that is open to the Internet traffic is called a:

A

Bastion host ( most hardened )

54
Q

___________ in a network that are setup to invite attacks to capture information are called:

A

Honeypots

55
Q

____________ are connected to a network to invite attacks to capture information, but act like a mini network instead of one computer

A

Honeynets

56
Q

___________ in the DMZ are still protected by a firewall.

A

Servers

57
Q

___________ basically filter traffic based on specific criteria and are normally positioned on the edge of your network. They can be either network or host based. Also come in hardware and software varieties.

A

firewalls

58
Q

A physical firewall device is called a:

A

Hardware Firewall

59
Q

These are firewalls but can also be much, much more:

A

Unified threat management ( UTM )

60
Q

this type of firewall looks at and directs its traffic coming in and out based on the IP and MAC addresses

A

Stateless firewall

61
Q

This type of firewall uses what is like a state table or a hierarchy of account roles/permissions. Allows internal computers to communicate with servers or other computers based on their conversations.

A

Stateful Firewall

62
Q

It’s common to have a ________ function both as stateful and stateless

A

firewall

63
Q

_____________ can have context - and application -aware __________ that filter based on the content of the packets

A

Routers - Firewalls

64
Q

Which would be an example of a Denial of Service (DoS) attack?

A

Ping flood

65
Q

Which would be the BEST example of an on-path attack (man-in-the-middle)?

A

Connecting a laptop to an access point to sniff packets and intercept them.

66
Q

A standard user in a company receives an e-mail from what looks like her bank. It requests that she click on a link to fix her account information. What type of social engineering is this?

A

Phishing

67
Q

Which type of malware seems innocent until you perform a specific action?

A

Trojan