Module 16 Network Security Fundamentals (FT) Flashcards

(73 cards)

1
Q

_____ on a network can be devastating and can result in a loss of time and money due to damage, or theft of important information or assets.

A

Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ can gain access to a network through software vulnerabilities, hardware attacks, or through guessing someone’s username and password

A

Intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four types of threats that may arise:?

A
  • Information Theft
  • Data Loss and Manipulation
  • Identity Theft
  • Disruption of Service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ is the degree of weakness in a network or a device.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three primary vulnerabilities or weakness?

A
  • Technological Vulnerabilities
  • Configuration Vulnerabilities
  • Security Policy Vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

might include TCP/IP Protocol weaknesses, Operating System Weaknesses, and Network Equipment weaknesse

A

Technological Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

might include unsecured user accounts, system accounts with easily guessed passwords, misconfigured internet services, unsecure default settings, and misconfigured network equipment.

A

Configuration Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

might include lack of a written security policy, politics, lack of authentication continuity, logical access controls not applied, software and hardware installation and changes not following policy, and a nonexistent disaster recovery plan.

A

Security Policy Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If network resources can be physically compromised, a ______ can deny the use of network resources.

A

threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the four classes of physical threats

A
  • Hardware Threats
  • Environmental Threats
  • Electrical Threats
  • Maintenance Threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This includes physical damage to servers, routers, switches, cabling plant, and workstations.

A

Hardware Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This includes temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).

A

Environmental Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This includes voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.

A

Electrical Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

-This includes poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling.

A

Maintenance Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ is short for malicious software

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It is code or software specifically designed to damage, disrupt, steal, or inflict “Bad” or illegitimate action on data, hosts, or networks.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the various types of malware:

A
  • Viruses
  • Worms
  • Trojan Horses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A _____ is a type of malware that propagates by inserting a copy of itself into, and becoming part of, another program.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It spreads from one computer to another, leaving infections as it travels.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____ are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage

A

Computer worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In contrast to viruses, which require the spreading of an infected host file, ____ are standalone software and do not require a host program or human help to propagate.

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

It is a harmful piece of software that looks legitimate. Unlike viruses and worms, _____ do not reproduce by infecting other files. They self-replicate

A

Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____ must spread through user interaction such as opening an email attachment or downloading and running a file from the internet.

A

Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are some classified network attacks:

A
  • Reconnaissance Attacks
  • Access Attacks
  • Denial of Service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The discovery and mapping of systems, services, or vulnerabilities.
Reconnaissance Attakcs
26
The unauthorized manipulation of data, system access, or user privileges.
Access Attacks
27
The disabling or corruption of networks, systems, or services.
Denial of Service
28
For reconnaissance attacks, external threat actors can use internet tools, such as the ______ and _____ utilities, to easily determine the IP address space assigned to a given corporation or entity.
nslookup and whois 
29
______ exploit known vulnerabilities in authentication services, FTP services, and web services to gain entry to web accounts, confidential databases, and other sensitive information.
Access Attacks
30
What are the classified Access Attacks:
- Password Attacks - Trust Exploitation - Port Redirection - Man-in-the-middle
31
Implemented using brute force, trojan horse, and packet sniffers
Password Attacks
32
A threat actor uses unauthorized privileges to gain access to a system, possibly compromising the target.
Trust Exploitation
33
- A threat actor uses a compromised system as a base for attacks against other targets. For example, a threat actor using SSH (port 22) to connect to a compromised host A. Host A is trusted by host B and, therefore, the threat actor can use Telnet (port 23) to access it.
Port Redirection
34
The threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.
Man-in-the-middle
35
______ attacks are the most publicized form of attack and among the most difficult to eliminate. However, because of their ease of implementation and potentially significant damage, _____ attacks deserve special attention from security administrators.
Denial of service (DoS)
36
These attacks are relatively simple to conduct, even by an unskilled threat actor can do
Denial of Service
37
A network of infected hosts, known as _____
zombie
38
A network of zombies is called _____
botnet
39
The threat actor uses a ______ program to instruct the botnet of zombies to carry out a DDoS attack
Command and Control (CnC)
40
To mitigate network attacks, most organizations employ a ______ approach (Also known as layered approach) to security
Defense in depth
41
What are some security devices and services that are implemented to protect organization's users and assets against TCP/IP threats:
- VPN - ASA Firewall - IPS - ESA/WSA - AAA Server
42
_____ is one of the most effective ways of protecting against data loss
Backing up device configurations and data
43
____ should be performed on a regular basis as identified in the security policy.
Backups
44
______ are usually stored offsite to protect the backup media if anything happens to the main facility
Data backups
45
- Perform backups on a regular basis as identified in the security policy. - Full backups can be time-consuming, therefore perform monthly or weekly backups with frequent partial backups of changed files.
Frequency
46
- Always validate backups to ensure the integrity of the data and validate the file restoration procedures.
Storage
47
- Backups should be transported to an approved offsite storage location on a daily, weekly, or monthly rotation, as required by the security policy.
Security
48
- Backups should be protected using strong passwords. The password is required to restore the data.
Validation
49
The most effective way to mitigate a worm attack is to _____ from the operating system vendor and patch all vulnerable systems
download security updates
50
One solution to the management of critical security patches is to make sure all end systems ______.
automatically download updates.
51
What is the meaning of "AAA" or "Triple A"
Authentication, Authorization, and accounting
52
_____ network security services provide the primary framework to set up access control on network devices.
Authentication, Authorization, and accounting ("AAA")
53
AAA is a way to control who is permitted to access a network
Authenticate
54
AAA. What actions they perform while accessing the network
Authorize
55
AAA. Making a record of what was done while they are there
Accounting
56
____ reside between two or more networks, control the traffic between them, and help prevent unauthorized access.
Network firewalls
57
A ____could allow outside users controlled access to specific services.
firewall
58
 ______ - Prevents or allows access based on IP or MAC addresses
Packet Filtering
59
______ - Prevents or allows access by specific application types based on port numbers
Application filtering
60
_____ - Prevents or allows access to websites based on specific URLs or keywords
URL filtering
61
______ - Incoming packets must be legitimate responses to requests from internal hosts.
Stateful packet inspection (SPI)
62
An ______, or host, is an individual computer system or device that acts as a network client. Common _____ are laptops, desktops, servers, smartphones, and tablets.
endpoint
63
_____ is one of the most challenging jobs of a network administrator because it involves human nature. A company must have well-documented policies in place and employees must be aware of these rules.
Securing endpoint devices
64
For Cisco routers, the ______ feature can be used to assist securing the system.
Cisco AutoSecure
65
- Default usernames and passwords should be changed immediately. - Access to system resources should be restricted to only the individuals that are authorized to use those resources. - Any unnecessary services and applications should be turned off and uninstalled when possible. - Often, devices shipped from the manufacturer have been sitting in a warehouse for a period of time and do not have the most up-to-date patches installed. It is important to update any software and install any security patches prior to implementation.
READ
66
- Use a password length of at least eight characters, preferably 10 or more characters. - Make passwords complex. Include a mix of uppercase and lowercase letters, numbers, symbols, and spaces, if allowed. - Avoid passwords based on repetition, common dictionary words, letter or number sequences, usernames, relative or pet names, biographical information, such as birthdates, ID numbers, ancestor names, or other easily identifiable pieces of information. - Deliberately misspell a password. For example, Smith = Smyth = 5mYth or Security = 5ecur1ty. - Change passwords often. If a password is unknowingly compromised, the window of opportunity for the threat actor to use the password is limited. - Do not write passwords down and leave them in obvious places such as on the desk or monitor.
READ
67
On Cisco routers, leading spaces are _____ for passwords, but spaces after the first character are not.
Ignored
68
A _____ is often easier to remember than a simple password. It is also longer and harder to guess.
passphrase
69
Encrypt all plaintext passwords with the ______ command.
service password-encryption
70
Set a minimum acceptable password length with the _____ command.
security passwords min-length
71
Deter brute-force password guessing attacks with the ______ command.
login block-for # attempts # within #
72
Disable an inactive privileged EXEC mode access after a specified amount of time with the ______ command.
exec-timeout
73
ENABLE SSH 1. Configure a unique device hostname. A device must have a unique hostname other than the default. 2. Configure the IP domain name. Configure the IP domain name of the network by using the global configuration mode command ip-domain name. 3. Generate a key to encrypt SSH traffic. SSH encrypts traffic between source and destination. However, to do so, a unique authentication key must be generated by using the global configuration command crypto key generate rsa general-keys modulus bits. The modulus bits determines the size of the key and can be configured from 360 bits to 2048 bits. The larger the bit value, the more secure the key. However, larger bit values also take longer to encrypt and decrypt information. The minimum recommended modulus length is 1024 bits. 4. Verify or create a local database entry. Create a local database username entry using the username global configuration command. 5. Authenticate against the local database. Use the login local line configuration command to authenticate the vty line against the local database. 6. Enable vty inbound SSH sessions. By default, no input session is allowed on vty lines. You can specify multiple input protocols including Telnet and SSH using the transport input [ssh | telnet] command.
READ