Securing Your Network Flashcards

(59 cards)

1
Q

Difference between IDS and IPS

A

IDS - identify threats and provides alerts

IPS - Identify threats and reacts to threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Difference between HIDS and NIDS

A

HIDS - host based and traffics goes through a NIC

NIDS - Network based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The two types of detection methods used in IDS

A

Signature-based aka definition

Heuristic / behavioral based aka anomaly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The difference between SYN flood guard and flood guard on a switch

A

SYN Flood guard - Usually included in firewalls

Flood Guard on switch - Used to prevent MAC flood attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Difference between false positives and false negatives in regards to IDS

A

False Positive - An alarm or alert on an event that is non-threatening.

False Negative - When an attack is occurring but the IDS does not identify the threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the threshold range of IDS. What is the result of the threshold being to low or to high

A

1 to 1000.
Too Low - IDS will raise too many alerts on events that are legitimate.
Too High - IDS will fail to identify threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intrusion system that is in-line aka in-band

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intrusion system that collects data passively or out-of-band

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intrusion system that have protocol analyzer capabilities

A

Both IDS and IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the disadvantage of an active NIDS

A

It blocks an attack only after the attack has started

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware devices that focus on handling TLS traffic. Allows systems to off-load encryption workload to a separate hardware device to alleviate stress on computer resources.

A

SSL/TLS Accelerator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used in conjunction with NIPS to mitigate threats that use encryption technologies.

A

SSL Decryptors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It uses virtualization technologies to separate data and control planes within a network. Commonly used with ABAC.

A

SDN - Software Defined Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A port based authentication protocol that authenticates prior to granting access to a network

A

IEEE 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Methods used to authenticate VPN clients before they connect

A

Implement IEEE 802.1x as Remote Authentication Dial-In User Service (RADIUS) or Diameter Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The two distinctions of wireless AP

A
  • All wireless routers are AP’s

- Not all AP’s are wireless routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A stand alone, intelligent, or autonomous AP, includes everything needed to connect wireless clients to a wireless network

A

Fat AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Is not a stand alone AP

A

Thin AP or controller-based AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This identified an AP or wireless network

A

SSID - Service Set Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Disabling SSID is a sure way to deny an attacker from finding a network. True or False

A

False. Makes it more difficult but an attacker can find it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How would an attacker over-ride MAC Filtering.

A

An attacker could sniff an allowed mac address and spoof the address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A strong security protocol for wireless networks

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the replacement for WPA

A

WPA2 aka 802.11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What encryption method does WPA and WPA2 use

A

WPA - Temporal Key Integrity Protocol (TKIP)

WPA2 - Chaining Message Authentication Code Protocol (CCMP)

25
Strong encryption based on Advanced Encryption Standard (AES)
CCMP - Chaining Message Authentication Code Protocol
26
Description of PSK, Enterprise, and Open modes
WPA/WPA2 modes. PSK - Pre-shared Keys - uses a passphrase. Provides authorization without authentication. Enterprise - Uses 802.1x server and RADIUS to provide authorization with authentication. Open - Open access. No security is enabled for network access
27
What is the RADIUS port
1812 but some use vendors use 1645
28
What are the 6 Authentication Protocols
EAP - creates secure encryption key aka Pairwise Master Key EAP FAST - Cisco -supports certificates (optional) PEAP - Encrypts EAP with TLS. Requires certificate on Server EAP-TTLS - Extension of PEAP. Requires certificate on 802.1x server. EAP TLS - Most secure. Requires certificates on 802.1x server and each of the wireless clients RADIUS Federation -
29
A technical solution that forces clients using web browsers to complete a specific process before it is allowed access to a network.
Captive Portal
30
What two security protocols are considered the strongest for wireless networks.
WPA2 using CCMP
31
A type of attack that removes a wireless client form a wireless network.
Disassociation Attack
32
This allows users to configure wireless devices without typing in a passphrase. It is also susceptible to brute attacks and therefore should be disabled.
WPS - Wifi Protected Setup
33
Difference between a Rogue AP and an Evil Twin
Rogue AP - Illegal Access Point | Evil Twin - Deliberately set up to look like a legitimate Access Point.
34
A DOS attack that prevents users from connecting to a wireless network by transmitting noise or another radio frequency on the same frequency as the network.
Jamming Attack
35
A type of attack that attempts to discover the pre-shared key from the IV. WEP is susceptible. The attack is successful when an encryption system reuses the IV.
Initiation Vector attack.
36
A type of attack that eavesdrops communication between mobile devices
NFC Attack - Near Field Communication
37
Define Bluejacking, Bluesnarfing, Bluebugging
Bluejacking - unauthorized messages are sent to devices. Harmless Bluesnarfing - attacker gains access to information on bluetooth device Bluebugging - attacker gains access and control of device.
38
A type of attack that captures data between two entities and modifies to impersonate the data of one of the entitites
Replay Attack - WPA and TKIP is susceptible to this attack.
39
RFID attacks include the following
Sniffing or eavesdropping Replay DoS
40
A dedicated device use by large organization to provide VPN capabilities
VPN Concentrator - placed in the DMZ.
41
A method of encrypting data in transit that support both transit and tunnel mode.
IPsec
42
IPsec support two modes. Which is one is used in a VPN.
Transit and Tunnel. Tunnel mode is used for VPN's
43
IPsec. Provides security in three ways. What are they.
AH - Authentication Header. Port id 51. Provides Authentication and Integrity. Encryption - Encapsulating Security Payload (ESP). Port ID 50. ESP provides Authentication, Integrity, and Confidentiality IKE - Internet Key Exchange - UDP port 500 to authenticate clients.
44
What tunneling protocol uses TLS. What port?
Secure Socket Tunneling Protocol. TCP 443.
45
Split Tunnel vs Full Tunnel
Split - IPsec configured to determine what traffic should be encrypted. Full - All traffic is encrypted.
46
A VPN configuration model in which two networks separated geographically are connected by two VPN Servers
Site to Site VPN's
47
VPN configuration that can be both site to site and remote access VPN
Always on VPN
48
Provides a way to monitor and inspect computers to mitigate risks of remote access to a private network. Can inspect internal clients.
NAC - Network Access Control
49
What happens when client doesn't meet health conditions set forth by a NAC.
Client goes to remediation network aka quarantine network
50
A type of NAC agent that is installed on a client and stays on the client in order to streamline NAC from remote connections
Permanent Agent
51
A type of NAC agent that is downloaded and run on the client when the client logs on remotely
Dissolvable Agent.
52
What are the 7 remote access authentication mechanisms
PAP - Password Authentication Protocol CHAP - Challenge Handshake Authentication Protocol MSCHAP MSCHAPv2 (RADIUS) Remote Authentication Dial-In User Service DIAMETER Terminal Access Controller Access-Control System Plus (TACACS+)
53
What is PAP
Password Authentication Protocol - uses Point to Point Protocol (PPP) and not secure because data is sent clear text
54
What is CHAP
Challenge Handshake Authentication Protocol uses PPP but is more secure because it uses hashing.
55
What is MS-CHAP and MS-CHAPv2
Microsoft version of CHAP. CHAPv2 does mutual authentication.
56
What is RADIUS
A centralized authentication service. Can also be used with 802.1x server with WPA enterprise mode.
57
What is TACACS+
Terminal Access Controller Access-Control System Plus - Cisco alternative to RADIUS but encrypts entire authentication process and uses multiple challenges and responses between client and server. Can be used with Kerberos.
58
What is Diameter
An extension of RADIUS and has more capabilities. It uses TCP instead of UDP.
59
What remote access authentication systems are AAA protocols
AAA - Authentication Authorization Accounting. RADIUS Diameter TACACS+ Kerberos is not. It doesn't do accounting.