QUESTIONS AND ANSWERS 100%
CORRECT
Static Addresses - ANSWER-Some private network nodes may be assigned a static
Public IP address that is routable and not affected by your NAT translation scheme
Authorization - ANSWER-Normally use Microsoft Active Directory Services for
privilege access control. Defines what individual users may or may not do.
Session Hijacking - ANSWER-When a hacker takes over a connection after a client
has authenticated with a server. A hacker must eavesdrop to learn details, such as
the addresses of the session endpoints and the sequencing numbers. The hacker
will desynchronize the client, take on the clients address, and inject packets into the
data stream. If the server accepts them, the session has been taken over. The Hunt
tool may be used for this purpose.
Man-in-the-middle (MinM) attack - ANSWER-A hacker is positioned between a client
and a server. The client is fooled into connecting with the hacker's computer instead
of the real server. The hacker performs a spoofing attack to trick the client. The
connection between client and server is then proxied by the hacker who can
eavesdrop and manipulate the communication.
Reconnaissance (Footprinting) Phase - ANSWER-Learning as much as possible
about the target before an attack. collecting data about the target from multiple
sources online and offline. Effective Recon is done covertly without tipping off the
target. Also called footprinting, discovery, research, and info gathering.
What items should be covered in a company security policy - ANSWER-How to treat
company data, requires the deployment of a firewall, confidentiality policies, etc.
Should be clearly written with solid and well-defined goals. Senior Management has
the ultimate responsibility for security. a written policy ensures the success of your
company's security infrastructure.
Acceptable User Policy (AUP) - ANSWER-It is a document that new users must
review and sign before they are allowed access to the company network resources
and infrastructure. Details what the user is and is not allowed to do on the company
network.
Advanced Persistent Threat (APT) - ANSWER-A network attack in which an intruder
gains access to a network and stays there undetected with the intention of stealing
data over a long period of time. Sectors with high value information such as defense,
manufacturing, and financial are common targets.
What protocols do VPNS use for encrypting data? - ANSWER-Normally IPSec or
TLS (SSH sunsetting next month)
, Wired Networks vs. Wireless Networks - ANSWER-Biggest difference is the
mechanism and proximity of the attack. Wired networks the hacker must gain
physical proximity and make direct contact with a network device. With wireless, the
hacker doesn't have to be physically close (<1000' up to a mile with a directional
antenna). In wireless networks, the hacker could use a rogue AP.
Replay Attack - ANSWER-A hacker uses a network sniffer and then retransmits that
traffic back on the network at a later time. These attacks often focus on
authentication traffic hoping that retransmitting the same packets will allow the
hacker to logon
Strong Encryption - ANSWER-Encryption that is difficult to decrypt or "break" without
the encryption key. Has a good algorithm, a long keyspace (normally 128 bits.), and
good key management. encryption fails If either endpoint is compromised or if
intermediate network nodes that decrypt & encrypt fail.
Avalanche effect - ANSWER-Algorithm design requirement so that slight changes to
the input result in drastic changes to the output. Common feature of hash values.
digital certificate - ANSWER-an electronic proof of identity issued by a CA. It is an
entity's public key encoded by the CA's private key
Digital Signature - ANSWER-a public-key cryptography based mechanism for
proving the source (and possibly integrity) of a signed dataset or message. Uses the
private key of the sender.
Hashes - ANSWER-A unique digest produced by an algorithm when applied to a
data set. It verifies the integrity of the data.
VPNs (Virtual Private Networks) - ANSWER-These are created and managed by
using protocols such as Point-to-Point Tunneling Protocol and Layer 2 Tunneling
Protocol which build on the functionality of PPP. This makes it possible to create
dedicated point-to-point tunnels through a public network such as the Internet.
VPN-Cons - ANSWER-difficult to set up, latency, MTU, throughput limited.
VPN-Pros - ANSWER-Allow secure remote access to internal, private networks.
Less expensive than leased lines. Prevents eavesdropping.
Bastion Host - ANSWER-a hardened server normally in the DMZ that has all
unnecessary applications and protocols removed from it.
What systems are normally hardened? - ANSWER-servers and client workstations
are hardened by removing unnecessary software, installing updates, and imposing
secure configuration settings.
Insertion attack - ANSWER-an exploit based on the introduction of unauthorized
content or devices to an otherwise secured infrastructure. Three common attacks
include SQL, IDS, and rogue devices.