Security Operations 4.5 Flashcards

Given a scenario, modify enterprise capabilities to enhance security

1
Q

Firewall

A

Filter traffic by port number or application.
Traditional - filter by port number
NGFW - Filter by application.
Encrypt traffic - VPN between sites.
Most firewalls can be layer 3 devices. Often sits on the ingress.egress of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NGFW

A

Most advance firewall which sits at the top of the OSI model - application layer
Layer 7 firewall.

Performs deep-packet inspection adding application level inspection as a core feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ports and Protocols

A

Traditional firewall which makes forwarding decisions based on TCP or UDP port numbers.

They either allow or disallow traffic based on destination protocol and port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the the ingress egress of the network?

A

The point that separates the internet from the internal part of the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Screened subnet

A

Commonly holds data that needs to be accessed by people on the internet. But keeps private data separate on the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IPS

A

Intrusion prevention system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Host based firewalls

A

Monitor traffic going in and out of a single host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network based firewall

A

Protect an entire network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Stateless firewall

A

Uses rules implemented in ACL’s to identify allowed and blocked traffic. Rules are based on
- Permission
- Protocol
- Source
-Port or protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stateful Firewalls

A

Inspects traffic and makes decisions based on the traffic context or state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer 4 firewalls

A

Operate on the transport model of the OSI model. They inspect traffic and make decisions based on the traffic context or state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Web application firewall

A

Specfically designed to protect a web application. A web server hosts the web application, and the WAF is place between the web server and web server clients.

Level 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

URL Scanning.

A

Allow or restrict based on Uniform resource location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Agent Based

A

Installed on client software on the user’s device. Usually managed from a central console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Proxies

A

Sit between the users and the external network. Control of traffic managed through the proxy.

The proxy makes requests on behalf of the user. The proxy makes a decision based on what it receives on whether it wants to pass that response onto the end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Forward Proxy

A

The user and the proxy are internal network of the organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Block Rules

A

Based on specific URL or Category of content.
Different Dispositions - different rules for different types of website. EG block gambling, send alert if home and garden.

18
Q

Reputation

A

Filter URL’s based on perceived risk based on the reputation of the website.

19
Q

DNS filtering

A

Before connecting to a website, it get the iP address and performs a DNS look up.

Harmful sites are not provided.

20
Q

Operating system Security - Group Policy

A

Configuration management tool.

21
Q

Security Enhanced Linux

A

Security patches added to the Linux kernel which allow for enhanced security.

The patches give the central access control discretion over rights and permissions used in the Linux Operator as opposed to the individual user.

MAC - Mandatory access control
DAC - Discretionary Access Control.

22
Q

Secure Protocols - protocol selection

A

Make sure that when you an application you are not using insecure protocols which do not contain encryption.

Telnet - SSH
HTTP - HTTPS
IMAP - IMAPS
FTP - SFTP

23
Q

Port number Selection

A

you can tell whether an application secure of insecure based on the port number its using.

Port 80 - HTTP (Sent in the clear).
Port 443 HTTPS (Encrypted)

Port number usage does not guarantee security

24
Q

Transport Method

A

Transport method impacts security because. If transport is Open access - there is no transport level encryption

WPA3: All user data is encrypted.

VPN - Encrypted. Good choice for data transfer.

25
Q

SPF Protocol

A

Used DNS record to define which IP addresses are authorised to send emails on behalf of a domain.

26
Q

DKIM

A

Domain Keys identified mail
Digital signatures added to the transport process.

27
Q

DMARC

A

Builds on top of SFP by allowing domain owners to set policies for how to handle emails that fail authentication checks and providing, reporting mechanisms to monitor and improve email authentication performance.

28
Q

Three INSECURE data in transit methods

A

File Transfer Protocol
Trivial File Transfer Protocol
Secure Sockets Layer SSL

29
Q

FTP - File Transfer Protocol

A

Uploads and Downloads files to and from an FTP sever. In cleartext (NOT SECURE).

30
Q

Trivial File Transfer Protocol

A

Is used to transfer smaller amounts of data. Many attacks are done on TFTP. Most administrators commonly disable it.

31
Q

Secure Sockets layer

A

Was the primary method use to secure HTTP traffic as Hypertext transfer protocol. SSL can also encrypt other types of traffic such as SMTP. However, SSL has been compromised and is not recommended for use.

32
Q

Secure alternative data in transits protocols.

A

Transport Layer Security TSL - replacement for SSL

Internet Protocol Security (IPsec).

SSH /SCP (based on SSH) encrypts

SFTP Secure implementation of FTP. It is an extension fo secure shell using SSH to transmit the files in an encrypted format.

FTPS is another secure implementation of FTP is used TSL to encrypt FTP traffic.

33
Q

Remember me location 3958

A

Look it up

34
Q

Which three protocols create framework for email authentication

A

SPF, DKIM and DMARC

35
Q

File Integrity Monitors

A

File Integrity Monitors detect modified system files. A file integrity checker calculates hashes on a system files as a baseline. Then it periodically recalculates the hashes on these files and compares them with the hashes on the baseline. If the hashes are different then the system has been modified.

SFC - Windows FIM
Tripwire - Linux FIM

36
Q

Data Exfiltration

A

The unauthorised transfer of data outside of an organisation.

37
Q

Example of network based DLP.

A

Configure a DLP to look for specific words phrases or character strings. Any outgoing data, within an email or attachment containing this code word will be recognised by the DLP and blocked.

38
Q

Software based DLP

A

Installed on an individual system indetifying data exfiltration attempts and blocking them from succeeding.

39
Q

Network access control (NAC)

A

Inspects a computer and does not allow it to join the network if it does not pass the inspection.

40
Q

XDR

A

Extended detection and Response includes other types of devices and systems.

Goes beyond endpoint to include other types of devices and systems, such as network devices, cloud infrastructure and Iot Devices. Providing a more comprehensive view of the entire IT environment.

41
Q

EDR

A

Endpoint detection and response provides continuous monitoring of endpoints

Often uses advanced behavioural analysis techniques to identify suspicious activity and contain threats before they cause damage.

42
Q

User behaviour Analytics

A

XDR commonly includes user behaviour analytics. Watch users, hosts network traffic, data repositories