quiz 11 Flashcards

1
Q

In a signature-based monitoring environment, network traffic is analyzed for predetermined attack patterns.

A

True—Signature-based monitoring analyzes network traffic for predetermined attack patterns known as signatures stored in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Behavior-based monitoring establishes a performance baseline based on a set of normal network traffic evaluations.

A

False—Behavioral-based monitoring looks at previous behavior of applications and compares that to current activity on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anomaly-based monitoring uses predetermined attack patterns.

A

False—Anomaly-based monitoring establishes a performance baseline based on a set of normal network traffic evaluations. Signature-based monitoring uses predetermined attack patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Baselining is the process of measuring changes in networking.

A

True—Creating a baseline consists of selecting something to measure and measuring it consistently for a period of time; baselining is the process of measuring changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A broadcast storm is when the TCP/IP handshake has been compromised.

A

False—A broadcast storm is when there is an accumulation of protest animal key cast packet traffic on the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

By default, Wireshark is nonpromiscuous.

A

False—By default, Wireshark is promiscuous, which means it can delve into packets even if the packets were addressed to a different computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Monitor requires Windows server to run.

A

True—Windows Server 2003 and 2008 come with built-in versions of Network Monitor; the program does not run on Windows client operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An SNMP agent is software run on a server to monitor the network.

A

False—SNMP agents are software deployed by an NMS and loaded on monitored devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An NMS is the software run on one or more servers that control the monitoring of network attached devices and computers.

A

True—An NMS (network management system) controls the monitoring of SNMP-enabled devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SNMP uses port 143.

A

False—SNMP uses ports 161 and 162. IMAP uses 143.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When conducting an audit, what should be done after risk has been scanned for, analyzed, and calculated?
A. Define exactly what should be audited.
B. Create backups.
C. Create a list of vulnerabilities.
D. Develop a plan to mitigate risk.

A

D. After risk has been scanned for, analyzed, and calculated, a plan should be developed to mitigate those risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following is not part of the three-step auditing process? 
A. Enabling auditing for files. 
B. Turning on and auditing policy. 
C. Evaluating the system log. 
D. Reviewing the security log.
A

C. The system log doesn’t play into the auditing process; it deals with drivers, operating system files, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A person complains that he cannot see any events in the Event Viewer. Which of the following questions should you not ask the person?
A. Did you reboot your computer?
B. Has auditing been turned on in a policy?
C. Was auditing enabled for the individual objects?
D. Do you have administrative capabilities?

A

A. It is not necessary to ask the users whether they rebooted the computer. This will not affect whether they can see events in the Event Viewer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following questions should you take into account when securing log files? (Select the two best answers.)
A. Were the log files encrypted and hashed?
B. Are the logs stored in multiple locations?
C. Were the log files encrypted in a Kerberos system?
D. How big are the log files?

A

A and B. It is important to find out if log files have been encrypted, hashed, and where they are stored. Log files would not be stored in a Kerberos system. The size of log files deals more with log file maintenance than it does with security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which file would you set permissions on to protect the security log on Windows Server 2003? 
A. config 
B. system.log1 
C. SecEvent.evt 
D. Security.log
A

C. SecEvent.evt is the file you would set permissions on to protect the security log on Windows Server 2003. This file may have a different name depending on which Windows operating system you are working in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following is not an example of a default hidden share? 
A. IPC$ 
B. Security$ 
C. Admin$ 
D. C$
A

B. Security$ is not a hidden share. All the others listed are default hidden shares in Windows.

17
Q

Which of the following best describes an audit trail?
A. Records or logs that show the tracked actions of users
B. Ensuring that a person or group cannot refute the validity of your proof
C. Files that log activity of users
D. Software deployed via the network management system

A

A. An audit trail can best be described as records or logs that show the tracked actions of users, whether the user was successful in an attempt.

18
Q
Which tool can be instrumental in capturing FTP GET requests? 
A. Vulnerability scanner 
B. Port scanner 
C. Performance Monitor 
D. Protocol analyzer
A

D. A protocol analyzer captures data, including things such as GET requests that were initiated from an FTP client. Vulnerability scanners and port scanners look for open ports and other vulnerabilities of a host. Performance Monitor is a Windows program that reports on the performance of the computer system and any of its parts.

19
Q
You are setting up auditing on a Windows XP Professional computer. If set up properly, which log should have entries? 
A. Application log 
B. System log 
C. Security log 
D. Maintenance log
A

C. After Auditing is turned on and specific resources are configured for auditing, you need to check the Event Viewer’s Security log for the entries. These could be successful logons or misfired attempts at deleting files; there are literally hundreds of options. The Application log contains errors, warnings, and informational entries about applications. The System log deals with drivers, system files, and so on. A System Maintenance log can be used to record routine maintenance procedures.

20
Q
Which of the following is the most basic form of IDS? 
A. Anomaly-based 
B. Behavioral-based 
C. Signature-based 
D. Statistical-based
A

C. Signature-based IDS is the most basic form of intrusion detection systems or IDS. This monitors packets on the network and compare them against a database of signatures. Anomaly-based, behavioral-based, and statistical-based are all more complex forms of IDS. Anomaly and statistical are often considered to be the same type of monitoring methodology.