Understanding Mitigation Techniques Flashcards

1
Q

Constantly scanning the networking for possible break-ins is an example of what kind of intruder detection?

A

Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

logging all network events to a file
Examining files and calculating checksums for each
Are examples of what type of Intruder detection?

A

Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NetRanger, Session and Snort are forms of what?

A

Active-Intrusion Detection Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The below list are examples of reactive or proactive defence?

1) stay current, patch security holes
2) know your enemies’ strategies
3) using tools to protect your network against attack

A

Pro-active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What process are the below first 3 steps associated?

1) Detect the ?
2) Respond to it
3) Report it

A

? = incident

The Incident Response process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is eDiscovery?

A

the exchange of evidence by both sides in a law suit using electronic means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In digital-forensic investigations, what is the name of the records that show who controlled, secured and obtained the evidence?

A

Chain of Custody records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In digital-forensics investigations, what report contains the below two pieces of information?

1) time stamps and identification properties
2) full incident reconstruction

A

Forensics Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is suspended during a Legal Hold?

A

Normal processing of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In PKI, the public or the private key can be used to encrypt the data - TRUE or FALSE

A

TRUE.
The most common way is the private key encrypts and everyone else with the public key can decrypt. This verifies the information came from the sender and the data is considered signed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSH requires a certificate authority, TRUE or FALSE?

A

FALSE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What would you do to mitigate against VLAN hopping or DTP (Dynamic Trunking Protocol) attacks?

A

Change the default VLAN number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

setting the root bridges priority to zero helps mitigate against what kind of attack/threat? Why?

A

Rogue Switch attack
Why? - Because the elected root bridge is based on MAC address and priority, it prevents an attacker connecting a switch and setting it with a very low priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Apart from using Flood-Guard, what manual intervention can prevent MAC flooding attack of the Content Addressable Memory (MAC table) in a switch?
*if the CAM gets exhausted it will forward frames out of all ports, allowing the attacker to capture traffic for all hosts.

A

Limit the number of MAC addresses that can be associated with each user facing port to two (one for computer, one for IP phone).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an STP switching attack and how can it be mitigated?

A

Where an attacker connects their rogue switch that has an extremely low priority to the company’s switch. Because of the low priority, it forces their switch to be elected the new root bridge, thereby moving all traffic through their switch.

It can be prevented using BPDU guard (or Root Guard). BPDU guard will place the switch port into a disabled state if BPDUs are detected on the ports.
*BPDU guard is never implemented on trunk ports because BPDUs are only permitted on trunk ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What Cisco switch features can protect against the introduction of a rogue switch with a lower port priority?

A

Root Guard

BPDU guard

17
Q

What Cisco switch feature allows configuration of ‘trusted ports’ to allow DHCP messages to be forwarded on? What type of attack does this prevent?

A

Both the feature and attack are called DHCP Snooping

18
Q

Name the two File Integrity Monitoring services used on Windows and Unix, what is another name for these systems?

A

System Files Check - Windows
Tripwire - Unix
They’re both forms of HIDS (Host Based Intrusion Detection Systems)

19
Q

What type of administrative roll separation allow a normal user to be granted a local administrator role for the server without granting the domain administrator role?

A

Read Only Domain Controllers

20
Q

What is an open relay?

A

an open relay is an email server that relays from any server that requests. (should be restricted)

21
Q

The below steps form the latter of 6 steps of what process?

4) Recover
5) Remediate all components affected to ensure all traced of the ? have been removed
6) Review the ? and document findings

A

? = incident

the incident response process

22
Q

System Files Check and Tripwire are examples of Network Based Intrusion Detection Systems - true or false?

A

False - they’re examples of Host Based Intrusion Detection Systems