Modules 11-12 Flashcards

(22 cards)

1
Q

What are two characteristics of both IPS and IDS sensors? (Choose two.)

A. Neither introduce latency or jitter

B. Both use signatures to detect patterns

C. Both are deployed inline in the data stream

D. Both can stop trigger packets

E. Both can detect atomic patterns

A

Answer:
B, E

Explanation:
IDS sensors work offline and are passive. They add very little latency but cannot stop trigger packets. An IPS can stop trigger packets but, because it is installed inline, it adds some latency and jitter. Both use signatures to detect patterns and can detect atomic patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an advantage of using an IPS?

A. It is installed outside of the data traffic flow

B. It does not impact network traffic if there is a sensor overload

C. It can stop trigger packets

D. It has no impact on network latency

A

Answer:
C. It can stop trigger packets

Explanation:
An IPS can stop trigger packets but, since it is inline, it adds latency and jitter. IDS sensors are offline and cannot stop trigger packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a characteristic of an IDS?

A. It can affect network performance by introducing latency and jitter

B. It often requires assistance from other network devices to respond to an attack

C. It is installed inline with the network traffic flow

D. It can be configured to drop trigger packets that are associated with a connection

A

Answer:
B. It often requires assistance from other network devices to respond to an attack

Explanation:
An IDS operates passively and requires help from devices like routers or firewalls to take action on detected threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are two characteristics of an IPS operating in promiscuous mode? (Choose two.)

A. It can stop malicious traffic from reaching the target for all types of attacks

B. It sits directly in the path of the traffic flow

C. It requires another device to respond to an attack

D. It does not impact the flow of packets in forwarded traffic

E. It sends alerts and drops any malicious packets

A

Answer:
C, D

Explanation:
An IPS in promiscuous mode does not affect packet flow but cannot stop certain types of attacks directly such as malicious attacks. It relies on another device to act on alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting, and buffer overflow attacks?

A. SIEM

B. Nmap

C. Snort

D. NetFlow

A

Answer:
C. Snort

Explanation:
Snort is an open-source IDS/IPS capable of real-time traffic and port analysis, packet logging, and detecting probes and attacks, port scans, fingerprinting, and buffer overflow attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Snort IPS feature enables a router to download rule sets directly from cisco.com or snort.org?

A. Snort rule set pull

B. Signature allowed listing

C. Snort rule set push

D. Snort rule set updates

A

Answer:
A. Snort rule set pull

Explanation:
The Snort rule set pull feature allows automatic downloads of updated rules from cisco.com or snort.org. The download can occur using one-time commands or periodic automated updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a minimum system requirement to activate Snort IPS functionality on a Cisco router?

A. At least 4 GB RAM

B. At least 4 GB flash

C. ISR 2900 or higher

D. K9 license

A

Answer:
D. K9 license

Explanation:
Snort IPS requires an ISR 4300 or higher router, 8 GB RAM, 8 GB flash, and a K9 license.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is PulledPork?

A. An open-source network IPS

B. A centralized management tool for pushing rule sets to routers

C. A virtual service container on Cisco ISR routers

D. A rule management app that downloads Snort rule updates automatically

A

Answer:
D. A rule management app that downloads Snort rule updates automatically

Explanation:
PulledPork is a rule management application that can be used to automatically download Snort rule updates. Using PulledPork requires an authorization code, called an oinkcode, obtained from a snort.org account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two actions that an IPS can perform when a signature detects activity? (Choose two.)

A. Disable the link

B. Reconverge the network

C. Drop or prevent the activity

D. Allow the activity

E. Restart the infected device

A

Answer:
C, D

Explanation:
When a signature is triggered, an IPS can log, drop, prevent, reset, block, or allow activity depending on configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which IPS signature trigger category uses a decoy server to divert attacks away from production devices?

A. Honey pot-based detection

B. Policy-based detection

C. Pattern-based detection

D. Anomaly-based detection

A

Answer:
A. Honey pot-based detection

Explanation:
Honey pot-based detection uses a decoy server to attract and study attacks while diverting them from real systems.

Use of a honey pot can give administrators time to analyze incoming attacks and malicious traffic patterns to tune sensor signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What situation will generate a true negative IPS alarm type?

A. Normal traffic that generates a false alarm

B. A verified security incident that is detected

C. A known attack that is not detected

D. Normal traffic that is correctly ignored and forwarded

A

Answer:
D. Normal traffic that is correctly ignored and forwarded

Explanation:
True negatives occur when benign traffic is correctly identified as safe and no alert is generated.

The true negative alarm type is used when normal network traffic flows through an interface. Normal traffic should not, and does not generate an actual alarm. A true negative indicates that benign normal traffic is correctly being ignored and forwarded without generating an alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Match each intrusion protection service with the description.

A

Cisco Firepower Next-Generation IPS an IPS service enabled on a second generation ISR

Cisco Snort IPS a dedicated inline threat prevention appliance

External Snort IPS Server an IPS service enabled on first generation ISRs that is no longer supported

Cisco IOS IPS an IPS solution that requires a promiscuous port and an external Snort IDS/IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Match each Snort IPS rule action with the description.

A

Pass - blocks and logs the packet

Drop - blocks but does not log the packet

Reject - ignores the packet

Sdrop - blocks and logs the packet and sends a TCP reset or ICMP port unreachable message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is provided by the fail open and close functionality of Snort IPS?

A. Automatically disables problematic signatures

B. Blocks traffic flow or bypasses IPS checking if the engine fails

C. Keeps Snort updated with new signatures

D. Tracks the health of the Snort engine

A

Answer:
B. Blocks traffic flow or bypasses IPS checking if the engine fails

Explanation:
Fail-open and fail-close determine whether traffic is blocked or passed when the IPS engine fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a characteristic of the Community Rule Set type of Snort term-based subscriptions?

A. 60-day delayed access to updated signatures

B. Uses Cisco Talos for pre-exploit coverage

C. Fully supported by Cisco

D. Available for free

A

Answer:
D. Available for free

Explanation:
The Community Rule Set is free, has limited coverage, and 30-day delayed signature updates without Cisco support.

Subscriber Rule Set – Available for a fee and provides the best protection against threats. It includes coverage in advance of exploits by using the research work of the Cisco Talos security experts. This subscription is fully supported by Cisco.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a characteristic of the connectivity policy setting when configuring Snort threat protection?

A. Balances network security with performance

B. Prioritizes security over connectivity

C. Provides the lowest level of protection

D. Enables the highest number of signatures

A

Answer:
C. Provides the lowest level of protection

Explanation:
Snort offers three policy levels: Connectivity (least secure), Balanced, and Security (most secure).

Connectivity – The least secure option.
Balanced – The mid-range option of security.
Security – The most secure option.

17
Q

What is contained in an OVA file?

A. A current compilation of known threats

B. An installable version of a virtual machine

C. A list of signatures

D. A set of IDS/IPS detection rules

A

Answer:
B. An installable version of a virtual machine

Explanation:
Step 1 of IPS configuration is to download an OVA (Open Virtualization Archive) file. This is a packaged virtual machine image used to deploy Snort IPS.

18
Q

What is a network tap?

A. Provides statistics on packets through a router

B. Enables real-time analysis of security events

C. Copies frames to a monitoring device

D. A passive device that forwards all traffic to an analyzer

A

Explanation:
A network tap is used to capture traffic for monitoring the network. The tap is typically a passive splitting device implemented inline on the network and forwards all traffic, including physical layer errors, to an analysis device.

A network tap splits and forwards all network traffic (including errors) to a monitoring or analysis device.

19
Q

Which statement describes the function of the SPAN tool used in a Cisco switch?

A. Secure channel for syslog messages

B. Interconnects VLANs across switches

C. Supports SNMP traps

D. Copies traffic from one port to another for monitoring

A

Answer:
D. Copies traffic from one port to another for monitoring

Explanation:
SPAN (Switched Port Analyzer) mirrors traffic from one port to another so it can be analyzed by a monitoring tool.

Cisco Explanation:
To analyze network traffic passing through a switch, switched port analyzer (SPAN) can be used. SPAN can send a copy of traffic from one port to another port on the same switch where a network analyzer or monitoring device is connected.

SPAN is not required for syslog or SNMP. SPAN is used to mirror traffic, while syslog and SNMP are configured to send data directly to the appropriate server.

20
Q

A network administrator downloads a valid file but an alert is triggered. What condition describes this alert?

A. False negative

B. False positive

C. True negative

D. True positive

A

Answer:
B. False positive

Explanation:
A false positive occurs when normal, benign activity is incorrectly flagged as malicious.

Cisco Explanation:

Alerts can be classified as follows:

True Positive: The alert has been verified to be an actual security incident.

False Positive: The alert does not indicate an actual security incident. Benign activity that results in a false positive is sometimes referred to as a benign trigger.

An alternative situation is that an alert was not generated. The absence of an alert can be classified as:

True Negative: No security incident has occurred. The activity is benign.
False Negative: An undetected incident has occurred.

21
Q

What is an advantage of HIPS that is not provided by IDS?

A. Quick analysis through logging

B. Deploys sensors at network entry points

C. Monitors network processes and protects critical files

D. Protects system resources and OS processes

A

Answer:
D. Protects system resources and OS processes

Explanation:
HIPS (Host-based IPS) runs on individual hosts, monitoring system processes and protecting critical OS files — unlike network-based IDS.

Cisco Explanation:

Network-based IDS (NIDS) sensors are typically deployed in offline mode. They do not protect individual hosts.

Host-based IPS (HIPS) is software installed on a single host to monitor and analyze suspicious activity. It can monitor and protect operating system and critical system processes that are specific to that host.

HIPS can be thought of as a combination of antivirus software, antimalware software, and a firewall.

22
Q

What information must an IPS track to detect attacks matching a composite signature?

A. Total number of packets

B. State of packets related to the attack

C. Attacking period used by attacker

D. Network bandwidth consumed

A

Answer:
B. State of packets related to the attack

Explanation:
A composite (stateful) signature tracks the sequence or state of multiple packets over time to detect complex, multi-step attacks.

Cisco Explanation:

A composite signature is called a stateful signature. It identifies a sequence of operations distributed across multiple hosts over an arbitrary period of time. Because this type of attack involves multiple packets, an IPS sensor must maintain the state information.

However, an IPS sensor cannot maintain the state information indefinitely. A composite signature is configured with a time period to maintain the state for the specific attack when it is first detected.

Thus, an IPS may not be able to maintain all the information related to an attack such as total number of packets, total length of attack time, and the amount of bandwidth consumed by the attack.