Security Assessments and Audits (1) Flashcards

1
Q

As part of your security audit, you would like to see what type of network traffic is being transmitted on the network. Which type of tool should you use?

Protocol analyzer

Port scanner

Vulnerability scanner

A

Protocol analyzer

Protocol analyzers use a promiscuous mode network card driver that enables the capture of all network traffic. Each switch port is a collision domain that prevents capturing unicast traffic related to other hosts; however, some switches enable mirroring of all switch traffic to a specific port. Be aware that packet forgery is easy with freely available tools such as hping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your network consists of 250 computers. You must determine which machines are secure and which are not. Which type of tool should you use?

Protocol analyzer

Port scanner

Vulnerability scanner

A

Vulnerability scanner

Vulnerability scanners scan computers for known security vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You would like to focus on and track potential future malicious activity for a particular host in your screened subnet. What should you configure?

Honeynet

Honeypot

DMZ tracker

A

Honeypot

A honeypot is an intentionally vulnerable host used to attract and track malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following would you employ to determine which ports are open on a host?

Vulnerability scanner

Packet sniffer

Port scanner

A

Port scanner

Port scanners identify open ports on hosts similar to operating system commands such as netstat. Personal firewall software may impede the success of port scanners. Note that port scanning can be detected fairly easily by most modern network-based intrusion protection and detection tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technician must identify deviations from normal network activity. Which task must she first perform?

Trend analysis

Baseline analysis

Performance monitoring

A

Baseline analysis

A baseline analysis establishes what is normal on a given network. Without this data, it is difficult to determine deviations from the norm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Windows computer has not been patched and unnecessary services have not been disabled. Which of the following statements is true regarding security?

The computer will perform faster.

The computer has a large attack surface.

The computer has a small attack surface.

A

The computer has a large attack surface.

Computers with many potential vulnerabilities (software, physical) are said to have a larger attack surface than patched machines that run only software that is required. A larger attack surface means a higher degree of possibility of a machine becoming compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network security auditor simulates various network attacks against a corporate network. Which term best defines this procedure?

Vulnerability analysis

Network mapping

Penetration testing

A

Penetration testing

Penetration testing (pen testing) is an active, or intrusive, type of test that involves simulating malicious activity against hosts or entire networks to assess how secure they are and to identify threats. Proper written consent outlining the rules of engagement must be obtained prior to performing this type of testing, since testing could disrupt hosts and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your manager asks you to configure a collection of purposely vulnerable hosts in a DMZ for the purpose of tracking malicious attacker attempts. What term best describes what you are configuring?

Honeynet

Honeypot

Firewall

A

Honeynet

A honeynet is composed of two or more honeypots. These are intentionally vulnerable hosts used to track malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You run a vulnerability scan on subnet 192.168.1.0/24. The results state that TCP ports 135 through 139 are open on most hosts. What does this refer to, assuming default ports are being used?

File and Print Sharing

Web server

Mail server

A

File and Print Sharing

Windows File and Print Sharing generally uses TCP ports 135 to 139 to enable resources to be discoverable on a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

After careful log examination, you realize that somebody has hacked into your WEP-secured home wireless network. What can you do to improve the security of wireless traffic?

Use WPA2 Enterprise.

Use WPA2 PSK.

Disable SSID broadcasting.

A

Use WPA2 PSK.

Wi-Fi Protected Access (WPA2) pre-shared key (PSK) is considered more secure than Wired Equivalent Privacy (WEP) and would be the most suitable solution for a home router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should be done to ensure that your network security is effective?

Patch all operating systems.

Update the BIOS on all systems.

Periodically test network security controls.

A

Periodically test network security controls.

Periodic network testing, perhaps even penetration testing, is valuable to ensure that your network security controls remain valid over time and that previously uncompromised hosts have not been compromised and used for persistent attacker connectivity. Compromised hosts or network devices could allow attackers to use one vulnerable device to gain access, and from there scan for and exploit other vulnerable devices on the network (pivoting) through lateral movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are considered passive security testing? (Choose two.)

Capturing network traffic

Brute-force password attack

Dictionary-based disk decryption

OS fingerprinting

A

Capturing network traffic

OS fingerprinting

The passive testing of security controls does not interfere with the normal operation of a computer system or network. Capturing network traffic simply takes a copy of network packets already being transmitted, and OS fingerprinting attempts to determine the OS used by a device by analyzing network traffic responses from a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

From the following list, identify the security misconfiguration:

A domain administrative account is used as a service account.

An Active Directory account is used as a service account.

Windows stations receive updates from a WSUS server instead of the Internet.

A

A domain administrative account is used as a service account.

A Windows service (and UNIX/Linux daemons) must run under the context of a standard user account. Assigning a powerful domain administrative account presents a major threat if the service is compromised; the hacker would then have escalated domain administrative privileges. Service accounts should have only the rights and permissions required to function—nothing more. Many administrators do not force periodic password changes for service accounts, which presents yet another security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A security-auditing team has been hired to conduct network penetration tests against a network. The team has not been given any data related to the network or its layout. What type of testing will the team perform?

Unknown environment

Known environment

Partially known environment

A

Unknown environment

Unknown environment testing refers to the process by which computer software or networks are tested and the testers have no information about how the software or networks are designed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are having trouble pinging host 192.168.17.45; there are no replies. One of your users must use the Remote Desktop Protocol (RDP) against the host to run an application. You cannot test RDP for the user, because you are currently logged on locally to a Linux server with only a command line. What can you use to determine quickly whether RDP is running on 192.168.17.45?

Packet sniffer

Virus scanner

Port scanner

A

Port scanner

A port scanner is a quick, simple way to determine which ports are open on a host. Even though ping packets may be blocked, RDP packets may not be. Tools such as Netcat can be used on Linux and Windows to test communication with TCP and UDP ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

After conducting a security audit, you inform the network owner that you discovered two unencrypted wireless networks. Your client asks how best to secure wireless traffic. Which of the following is the most secure form of wireless network encryption?

WEP

WPA

WPA2

A

WPA2

WPA2 is the most secure option from the presented list. Unlike WPA, WPA2 must be tested and certified by the Wi-Fi Alliance. WPA2 also uses a stronger encryption implementation in the form of AES, the U.S. government–accepted encryption standard

17
Q

A security auditor must determine which types of servers are running on a network. Which type of tool should be used?

Network mapper

Protocol analyzer

Port scanner

A

Network mapper

Network mapping utilities such as the open source Cheops-ng tool can map out a network’s layout and identify operating systems running on hosts