Updated Midterm Flashcards
- When designing a network besides providing protection for network resources, describe the other two important concerns.
Dectection
IDS/IPS
Next Gen Firewall
Responding
network forensics
counter measure
- Describe in detail what a stateful firewall uses to determine whether to allow a packet entrance back thru a firewall.
A firewall that tracks the TCP session. Specifically source/destination IP address, source/destination port, flags, and sequence numbers.
- A third generation ___________ firewall is concerned with monitoring systems as DNS, web traffic, remote desktop, etc as the traffic moves through the firewall.
next gen
- Besides supporting normal stateful firewall operations, name two services provided by a next generation firewall.
IDS
URL filtering
- An example of a next generation firewall system is Cisco’s ________.
Firepower
- If an ASA firewalls are assigned security levels between 0 and 100 and by default traffic to flow from a _________ interface to a __________ interface.
outside, inside
- On a ASA firewall for the traffic to return back thru an interface a ________ rule must be configured.
NAT\ inspect rule
- In order for outside traffic to enter into a lower security region on a ASA firewall a ________ must be created on the firewall.
security zone
- You can configure a ________ port on an switch to collect all traffic moving thru an interface.
switch
- Wireshark needs _______ in order to collect traffic from the network.
NIC interface
- A __________ is the brains of wireshark and has the ability to converts binary information into intelligence.
dissector
- In Wiresharks terms a _______ contains layer 3 information such as IP.
packet
- In Wireshark terms a _______ contains layer 4 information such as port number.
segment
- A _______ is designed to detect suspicious traffic.
IDS
- Describe the three operations or functions SNORT can perform.
Packet Capture
Capture log packets going internally and externally
Packet Logging
Saves the network packets containing the traffic matching the IPS signature to the attack log
IDS
Monitors a network or systems for malicious activity or policy violations and sends a alert.
- Describe what can be configured in the 2 main parts of a SNORT signature.
1) Header
Action | protocol | SRC | SRC Port | Direction | DST | DST port
2) Body
message content sid
- In security onion ________ is normally used as the IDS systems to detect suspicious activity.
SNORT
- In security onion _______ is used to collect information of flows, websites visited, etc
BRO
- In security onion ________ can be used to display items seen in the logs of the previous 2 questions.
Sguil
- _______________ is the process of using some method to determine the operating system of a server.
OS fingerprinting
- _______________ is the process of using an automated tool to gather end user’s emails.
Email Havesting
- ____________ will gain information such as A, AAAA, CNAME and SOA records.
DNS harvesting
- When performing recon it is important to distinguish between _____ and physical servers.
virtual
- When protecting resources, you need to treat internal resources different from _______ resources.
external
- When protecting resources, you need to treat On-premises resources different from _______ resources.
Cloud
- _________ is the most popular utility used to perform a port scan.
NMAP
- __________ is a command utility which can be used to display network connections and ports open on a host.
Netstat
- In an IDS a which is ___________ based will determine alerts based upon a predefined pattern.
signature
- In a IDS a which is ________ pattern matching will compare traffic to a database of attack patterns.
pattern
- __________ scanners are tools or utilities used to be probe and reveal weaknesses in a networks security.
vulnerability
- _________ analysis looks at the entire packet including the payload.
packet
- __________ analysis looks at information contained in the header of a packet
protocol
- __________ analysis is technology developed by cisco which is sued to analyze IP traffic.
netflow
- __________ analysis works with capturing 802.11 packets.
wireless
- ___________ analysis looks for things which are not normal to flag suspicious activity.
anomaly
- Name any two types or sources of data output which can be used by a security analyst.
firewall logs, packet capture
- A __________ provides an automated tool for analyzing large amounts of data.
SIEM
- The technology in the previous question can be Agent based and _________ based.
Agentless
- The ____________ is a network logically separate from the intranet where resources which need access from the outside reside.
extranet
- __________ can be implemented which restricts access of devices to certain systems.
isolation
- A ________ can be used to access a secure network remotely thru a less secure network.
jump box
- Draw a picture of how the technology in the previous question is deployed.
?
- In Windows ____________ can be configured to provide security to users and the computers in an Active Directory environment .
group polices
- A _________ can be configured to attract hackers and lure them into spending time attacking bogus resources while monitoring their behaviors.
honeypot
- ____________ can be used from routers to restrict traffic between networks.
ACLs
- A ________ is a router designed to accept and analyze attack traffic.
sinkhole
- _______________ control is used to protect sensitive data by controlling access based upon the clearance level of the user or the sensitivity of the data.
Mandatory Access Controls
- A ____________ control are put in place to substitute for a primary access control method and is mainly there to mitigate risk.
compensating
- _____________ or management controls, are implemented to mange a organization’s assets.
Administrative
- Network ____________ control is a service which exams the stat of an end point before allowing the endpoint access to the network.
access
- ___________ is a protocol which provides authentication at layer 2.
802.1x
- In a ________ pen test the testing team is given limited knowledge of the target system.
blind
- ______________ can be used to determine how malware works.
decompsiton ?
- ______________ looks at the technical impact and likelihood of a threat compromising a vulnerability.
risk evaluation
- Name any two regulator legislations
Sarbanes oxley , HIPPA
- When establishing scanning frequency name one consideration.
technical constraints
- When configuring tools to perform scans according to specification, name one item to consider.
sensitivity level
- Name two things to do after a scan is completed.
vulnerability feed, remedation
- A _________ positive occurs when a alert if generated but there is no malicious activity.
false.
- Name any two vulnerabilities or attacks against web servers.
XXS , SQL Injection
- A ______ server is considered the holy grail of resources for an attacker.
database
- Describe any two attacks against the network infrastructure.
Mac overflow, Doublet Tagging
- _____________ elevation occurs when a normal user is able to escalate privileges to a domain administration.
priviledge
- Name any two threats mentioned against mobile devices.
Insecure wifi, use of location services
- A _______ provides remote or external devices access to remote network be building a virtual tunnel.
VPN
- Name one protocol which can perform the action in the previous question.
L2TP