Router, firewall
Implicit deny
Tunnel, transport
A security architect is designing a new web infrastructure. They need a device to sit in the DMZ that will meet two requirements:
What type of device is this?
Reverse Proxy
Explanation:
A network administrator disables SSID Broadcasting on the office Access Points, believing this will make the network invisible to attackers. An attacker arrives and is able to discover the SSID in minutes.
What tool did the attacker use, and why did this security measure fail?
Wireless Packet Sniffer (or Protocol Analyzer).
Explanation: Disabling SSID broadcasting is merely Security through Obscurity. While the SSID is removed from the “Beacon” frames, it is still transmitted in cleartext in other management frames (specifically Probe Responses and Association Requests) whenever a legitimate device connects. A sniffer captures these frames and displays the SSID.
Secure tunnel
Port security, 802.1x
Honeypot
False positive
Input filters
An ________ NIPS has traffic flowing through it; however, the NIDS is known as ________ and relies on sensors and collectors to discover new attacks.
Inline, passive
_________ __________ inspects traffic going to a website, whereas a _______ ________ inspects traffic across the network.
Banner Grabbing, packet sniffer
Banner grabbing uses tools such as Dimitri, _____, ________, and ________.
Nmap, telnet, and netcat
__________ shows established connections in a Windows environment, whereas _________ shows established connections in a Linux/Unix environment.
Netstat, netcat (nc)
A _____ system correlates security logs from various devices such as servers and firewalls. The security administrator has decided to store the logs into a _______ drive so that they can be read but not tampered with as they may be needed as evidence at a later date.
SIEM, WORM
A company could use a ____-__-____ VPN instead of an expensive lease line or even more expensive dark fiber, but it must be set to _______ - ___ mode.
Site-to-site, always-on
A _____ ________ could be used as a spam filter and a ____ solution to prevent PII and sensitive information from leaving the company.
Mail gateway, DLP
Both ____ and a ______ can detect when new hosts have been added to your internal network.
Nmap, NIDS
A __________-______ NIDS/NIPS uses a known database and is reliant on regular updates where _______- _____ NIDS/NIPS start with a known database but can identify new variants.
Signature-based, anomaly-based
A security administrator changes the default _________ and _________, disables the SSID, and enables ______ filtering to make a wireless access point more secure.
Username, password, MAC