Updated Midterm Flashcards

1
Q
  1. When designing a network besides providing protection for network resources, describe the other two important concerns.
A

Dectection
IDS/IPS
Next Gen Firewall

Responding
network forensics
counter measure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Describe in detail what a stateful firewall uses to determine whether to allow a packet entrance back thru a firewall.
A

A firewall that tracks the TCP session. Specifically source/destination IP address, source/destination port, flags, and sequence numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. A third generation ___________ firewall is concerned with monitoring systems as DNS, web traffic, remote desktop, etc as the traffic moves through the firewall.
A

next gen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Besides supporting normal stateful firewall operations, name two services provided by a next generation firewall.
A

IDS

URL filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. An example of a next generation firewall system is Cisco’s ________.
A

Firepower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. If an ASA firewalls are assigned security levels between 0 and 100 and by default traffic to flow from a _________ interface to a __________ interface.
A

outside, inside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. On a ASA firewall for the traffic to return back thru an interface a ________ rule must be configured.
A

NAT\ inspect rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. In order for outside traffic to enter into a lower security region on a ASA firewall a ________ must be created on the firewall.
A

security zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. You can configure a ________ port on an switch to collect all traffic moving thru an interface.
A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Wireshark needs _______ in order to collect traffic from the network.
A

NIC interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. A __________ is the brains of wireshark and has the ability to converts binary information into intelligence.
A

dissector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. In Wiresharks terms a _______ contains layer 3 information such as IP.
A

packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. In Wireshark terms a _______ contains layer 4 information such as port number.
A

segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. A _______ is designed to detect suspicious traffic.
A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Describe the three operations or functions SNORT can perform.
A

Packet Capture
Capture log packets going internally and externally

Packet Logging
Saves the network packets containing the traffic matching the IPS signature to the attack log

IDS
Monitors a network or systems for malicious activity or policy violations and sends a alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Describe what can be configured in the 2 main parts of a SNORT signature.
A

1) Header
Action | protocol | SRC | SRC Port | Direction | DST | DST port

2) Body
message content sid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. In security onion ________ is normally used as the IDS systems to detect suspicious activity.
A

SNORT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. In security onion _______ is used to collect information of flows, websites visited, etc
A

BRO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. In security onion ________ can be used to display items seen in the logs of the previous 2 questions.
A

Sguil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. _______________ is the process of using some method to determine the operating system of a server.
A

OS fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. _______________ is the process of using an automated tool to gather end user’s emails.
A

Email Havesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. ____________ will gain information such as A, AAAA, CNAME and SOA records.
A

DNS harvesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. When performing recon it is important to distinguish between _____ and physical servers.
A

virtual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. When protecting resources, you need to treat internal resources different from _______ resources.
A

external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. When protecting resources, you need to treat On-premises resources different from _______ resources.
A

Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. _________ is the most popular utility used to perform a port scan.
A

NMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. __________ is a command utility which can be used to display network connections and ports open on a host.
28
Q
  1. In an IDS a which is ___________ based will determine alerts based upon a predefined pattern.
29
Q
  1. In a IDS a which is ________ pattern matching will compare traffic to a database of attack patterns.
30
Q
  1. __________ scanners are tools or utilities used to be probe and reveal weaknesses in a networks security.
A

vulnerability

31
Q
  1. _________ analysis looks at the entire packet including the payload.
32
Q
  1. __________ analysis looks at information contained in the header of a packet
33
Q
  1. __________ analysis is technology developed by cisco which is sued to analyze IP traffic.
34
Q
  1. __________ analysis works with capturing 802.11 packets.
35
Q
  1. ___________ analysis looks for things which are not normal to flag suspicious activity.
36
Q
  1. Name any two types or sources of data output which can be used by a security analyst.
A

firewall logs, packet capture

37
Q
  1. A __________ provides an automated tool for analyzing large amounts of data.
38
Q
  1. The technology in the previous question can be Agent based and _________ based.
39
Q
  1. The ____________ is a network logically separate from the intranet where resources which need access from the outside reside.
40
Q
  1. __________ can be implemented which restricts access of devices to certain systems.
41
Q
  1. A ________ can be used to access a secure network remotely thru a less secure network.
42
Q
  1. Draw a picture of how the technology in the previous question is deployed.
43
Q
  1. In Windows ____________ can be configured to provide security to users and the computers in an Active Directory environment .
A

group polices

44
Q
  1. A _________ can be configured to attract hackers and lure them into spending time attacking bogus resources while monitoring their behaviors.
45
Q
  1. ____________ can be used from routers to restrict traffic between networks.
46
Q
  1. A ________ is a router designed to accept and analyze attack traffic.
47
Q
  1. _______________ control is used to protect sensitive data by controlling access based upon the clearance level of the user or the sensitivity of the data.
A

Mandatory Access Controls

48
Q
  1. A ____________ control are put in place to substitute for a primary access control method and is mainly there to mitigate risk.
A

compensating

49
Q
  1. _____________ or management controls, are implemented to mange a organization’s assets.
A

Administrative

50
Q
  1. Network ____________ control is a service which exams the stat of an end point before allowing the endpoint access to the network.
51
Q
  1. ___________ is a protocol which provides authentication at layer 2.
52
Q
  1. In a ________ pen test the testing team is given limited knowledge of the target system.
53
Q
  1. ______________ can be used to determine how malware works.
A

decompsiton ?

54
Q
  1. ______________ looks at the technical impact and likelihood of a threat compromising a vulnerability.
A

risk evaluation

55
Q
  1. Name any two regulator legislations
A

Sarbanes oxley , HIPPA

56
Q
  1. When establishing scanning frequency name one consideration.
A

technical constraints

57
Q
  1. When configuring tools to perform scans according to specification, name one item to consider.
A

sensitivity level

58
Q
  1. Name two things to do after a scan is completed.
A

vulnerability feed, remedation

59
Q
  1. A _________ positive occurs when a alert if generated but there is no malicious activity.
60
Q
  1. Name any two vulnerabilities or attacks against web servers.
A

XXS , SQL Injection

61
Q
  1. A ______ server is considered the holy grail of resources for an attacker.
62
Q
  1. Describe any two attacks against the network infrastructure.
A

Mac overflow, Doublet Tagging

63
Q
  1. _____________ elevation occurs when a normal user is able to escalate privileges to a domain administration.
A

priviledge

64
Q
  1. Name any two threats mentioned against mobile devices.
A

Insecure wifi, use of location services

65
Q
  1. A _______ provides remote or external devices access to remote network be building a virtual tunnel.
66
Q
  1. Name one protocol which can perform the action in the previous question.