Securing the Network Infrastructure Flashcards
You are a guest at a hotel offering free Wi-Fi Internet access to guests. You connect to the wireless network at full signal strength and obtain a valid TCP/IP configuration. When you try to access Internet web sites, a web page displays instead asking for a code before allowing access to the Internet. What type of network component is involved in providing this functionality?
DHCP server
NAT
Proxy server
Proxy server
Proxy servers retrieve content for connected clients and can also require authentication before doing so
You are configuring a wireless router at a car repair shop so that waiting customers can connect to the Internet. You want to ensure that wireless clients can connect to the Internet but cannot connect to internal computers owned by the car repair shop. Where should you plug in the wireless router?
LAN
Port 1 on the switch
DMZ
DMZ
A demilitarized zone (DMZ) is a network that allows external unsecure access to resources while preventing direct access to internal resources. If the wireless router is plugged into the DMZ, this will provide Internet access to customers while disallowing them access to internal business computers. Plugging the wireless router into the internal LAN would also allow Internet access but would place customers on a business LAN
What will detect a network or host intrusion and take action to prevent the intrusion from succeeding?
IPS
IDS
IPSec
IPS
An intrusion prevention system (IPS) actively monitors network or system activity for abnormal activity and also takes steps to stop it. Abnormal activity can be detected by checking for known attack patterns (signature-based), variations beyond normal activity (anomaly-based), or behavioral variations
What technology uses a single external IP address to represent many computers on an internal network?
IPSec
DHCP
NAT
NAT
NAT runs on a router and allows computers on an internal network to access an external network using only a single external IP address. NAT routers track outbound connections in order to deliver inbound traffic to the originating internal host
You must purchase a network device that supports content filtering and virus defense for your LAN. What should you choose?
NAT router
HIPS
Web security gateway
Web security gateway
Web security gateways can perform deep packet inspection (content) to filter network traffic. They also include the ability to detect and deal with malware
You have been asked to somehow separate Engineering departmental network traffic from Accounting departmental traffic because of a decrease in network throughput. What should you use?
VLAN
DMZ
NAT
VLAN
A virtual local area network (VLAN) creates separate broadcast domains in the same way a router physically separates two network segments. Both the Engineering and Accounting departments should be configured on their own VLANs, thus separating their network traffic
Which tool would enable you to capture and view network traffic?
Vulnerability scanner
Port scanner
Protocol analyzer
Protocol analyzer
Protocol analyzers capture and view network traffic by placing the network card into promiscuous mode. In a switched environment, you will capture only network traffic involving your machine in addition to multicast and broadcast packets. Enable port monitoring or mirroring on your switch to view all network activity on the switch
You are reviewing router configurations to ensure they comply with corporate security policies. You notice the routers are configured to load their configurations using TFTP and also that TCP port 22 is enabled. What security problem exists with these routers?
Telnet should be disabled.
Telnet should have a password configured.
TFTP is an insecure protocol.
TFTP is an insecure protocol.
Trivial File Transfer Protocol (TFTP) transmits data (such as router configurations) in clear text. TFTP does not have an authentication mechanism; therefore, anybody with network access could have access to all router configurations. It would be more secure to store router configurations locally on the router and to secure the router with the appropriate passwords
A router must be configured to allow traffic only from certain hosts. How can this be accomplished?
ACL
Subnet
Proxy server
ACL
An access control list (ACL) is a router setting that allows or denies various types of network traffic from or to specific hosts
Which technologies enable analysis of network traffic? (Choose two.)
Port scanner
Sniffer
DMZ
NIDS
Sniffer
NIDS
Sniffers use network card promiscuous mode to capture all network traffic instead of only traffic addresses to the host running the sniffer. Switches isolate each port from one another, so sniffers will not see all switch network traffic unless a switch port is configured to do so. NIDSs are placed on the network strategically so they can analyze all network traffic to identify and report on suspicious activity
Sylvia’s workstation has been moved to a new cubicle. On Monday morning, Sylvia reports that even though the network card is plugged into the network jack, there is no link light on the network card. What is the problem?
The workstation has an APIPA address. Issue the ipconfig / renew command.
The default gateway has not been set.
Since the MAC address has changed, switch port security has disabled the port.
Since the MAC address has changed, switch port security has disabled the port.
A disabled switch port is the only choice that would result in an unlit link light on a network card
You need a method of authenticating Windows workstations before allowing local LAN access. What should you use?
VPN concentrator
Router
802.1x-compliant switch
802.1x-compliant switch
The 802.1x protocol defines how devices must first be authenticated before getting LAN access
An attacker sends thousands of TCP SYN packets with unreachable source IP addresses to a server. After consuming server resources with this traffic, legitimate traffic can no longer reach the server. What can prevent this type of attack?
Packet-filtering firewall
Antivirus software
SYN flood protection
SYN flood protection
SYN flood protection prevents the described DoS attack by limiting the number of half-open TCP connections. A normal TCP conversation follows a three-way handshake, whereby a SYN packet is sent to the target, which responds with a SYN-ACK packet. The originator then sends an ACK packet to complete the handshake. A large number of SYN packets consume server resources
A junior IT employee links three network switches together such that each switch connects to the two others. As a result, the network is flooded with useless traffic. What can prevent this situation?
Web application firewall
Loop protection
SYN flood guard
Loop protection
Loop protection is a switch feature that prevents uplink switch ports from switching to “forwarding” mode, thus preventing bridging loops
Your boss asks that specific HTTP traffic be monitored and blocked. What should you use?
Web application firewall
Protocol analyzer
Packet-filtering firewall
Web application firewall
Web application firewalls can stop inappropriate HTTP activity based on a configured policy. They can be stateful, in which they watch traffic end to end and can know what state in a transaction each packet is from, or stateless, in which they just examine the packet without knowing anything about what “conversation” it is a part of