Term
| What are the four goals in creating a secure network environment |
|
Definition
availability confidentiality functionality access control |
|
|
Term
| Ensuring network ___ means authorized users have access to information services and network resources |
|
Definition
|
|
Term
| What is the most common type of network attacks against corporations? |
|
Definition
|
|
Term
| IN the context of network security, ___ means preventing unauthorized users from gaining information about the network's infrastructure, data flowing across it, protocols used or packet header values |
|
Definition
|
|
Term
| ___ = identify based on known characteristics |
|
Definition
|
|
Term
| ___ means preventing attackers from altering the capabilities or operation of the netwrok |
|
Definition
|
|
Term
| policy driven control of access to systems data and dialoguses |
|
Definition
|
|
Term
| State the reasons securing corporate networks is difficult |
|
Definition
New attack vectors emerge old attack vectors that were fixed are repurposed |
|
|
Term
| ___ are ways of attacking networks |
|
Definition
|
|
Term
| ___ model of network defense had good guys inside and attackers on the outside. There was a well guarded ___ point of entry. |
|
Definition
|
|
Term
| a phrase used by network administrators to convey the idea that creating a 100% secure network is impossible |
|
Definition
|
|
Term
| the ___ model of a network has no distinct perimeter and has multiple ways of entering. |
|
Definition
|
|
Term
| for a city model, you must have more ___ |
|
Definition
intrusion detection systems virtual LANs central authentication servers encrypted internal traffic |
|
|
Term
| a ___ attack attempts to make a server or network unavailable to legitimate users |
|
Definition
|
|
Term
| Hackers primarily target ___ and ___ with DoS attacks |
|
Definition
|
|
Term
| Are all service interruptions attacks? |
|
Definition
|
|
Term
| A common nonattack loss of service happens when a larger site ___ |
|
Definition
| links to a much smaller site |
|
|
Term
| The ultimate goal of a DoS attack is to ___ |
|
Definition
|
|
Term
| DoS attacks cause harm by ___ or ___ |
|
Definition
stopping critical service degrading service over time |
|
|
Term
| at attack that ___ services is harder to detect because ___ |
|
Definition
slowly degrades there isn't an abrupt change in network quality |
|
|
Term
| The main DoS attack methods are |
|
Definition
indirect/direct intermediary reflected sending malformed packets |
|
|
Term
| A ___ occurs when an attacker tries to flood a victim with a stream of packets directly from ___ |
|
Definition
direct attack the attackers computer |
|
|
Term
| ___ tries to flood the victim with a spoofed IP. |
|
Definition
|
|
Term
| ___ or ___ attacks can only succeed if the attacker can flood the victim with more requests than the victim can handle |
|
Definition
| direct or indirect attacks |
|
|
Term
| ___ attacks are rare because ___ |
|
Definition
direct attackers dont like their IP shown on the incoming packets |
|
|
Term
| ___ occurs when a victim sends responses to the spoofed IP address used by the attacker, thus flooding an unintended victim |
|
Definition
|
|
Term
| Name the types of packets that can be used in a DoS attack |
|
Definition
SYN: victim is flooded with SYN packets to use all the memory to respond to the packets
Ping" victim is flooded with ICMP, aka Echo requests, that appear to be normal traffic. Bandwidth and CPU is allocated until crashing
HTTP: a victim, normally a webserver, is flooded with application layer web requests |
|
|
Term
| The second primary DoS method is to use ___ to attack the victim. |
|
Definition
|
|
Term
| ___ are typically referred to as ___ which are compromised hosts running malware controlled by the attacker |
|
Definition
|
|
Term
| A botmaster can send updates that give ___ to bots |
|
Definition
|
|
Term
| ___ are an additional layer of compromised hosts that are used to manage large groups of bots |
|
Definition
|
|
Term
| Similar to a DDoS attack, a ___ attack uses many hosts to overwhelm a victim using normal P2P traffic |
|
Definition
|
|
Term
| A P2P redirect differs from a DDoS because |
|
Definition
| the attacker doesn't have to control each host (make them bots), just convince them to redirect their legitimate P2P traffic |
|
|
Term
| Similar to a P2P redirect, a ___ uses responses from legitimate service to flood a victim |
|
Definition
|
|
Term
| in a reflected attack the attacker sends ___ to existing legitimate servers. All ___ are sent to the victim. |
|
Definition
spoofed requests responses |
|
|
Term
| Using a botnet in a reflected attack is known as a |
|
Definition
| Distributed reflected denial of service (DRDoS) |
|
|
Term
| ___ is a variation of a reflected attack that takes advantage of an indirectly configured network device to flood a victim |
|
Definition
|
|
Term
| in a smurf flood, the attacker sends a ___ to a network device that forwards the request to ___. |
|
Definition
spoofed ICMP echo request all internal hosts |
|
|
Term
| ___ is a well known older attack that uses an illegally large IP packet to crash the victim's operating system |
|
Definition
|
|
Term
| Malformed SMS messages can be used to crash cell phones in an attack called ___ |
|
Definition
|
|
Term
| ___ is dropping all IP packets from an attacker to stop a DoS attack |
|
Definition
|
|
Term
| A firewall can create a ___. This is done when an SYN segment arrives, the firewall itself sends back a SYN/ACK agreement without passing traffic to the server |
|
Definition
|
|
Term
| ___ can be used to reduce a certain type of traffic to a reasonable amount |
|
Definition
|
|
Term
| DoS attacks are community problems that can only be stopped with the help of ___ and ___ |
|
Definition
ISPs organizations whose computers are bots |
|
|
Term
| ___ is used to resolve 32 bit IP addresses into 48 bit local MAC adresses |
|
Definition
| Address Resolution Protocol (ARP) |
|
|
Term
| ___ is a network attack that manipulates host ARP tables to reroute LAN traffic |
|
Definition
|
|
Term
| An attacker uses ARP poisoning to reroute traffic for a ___ |
|
Definition
|
|
Term
| ARP poisoning only works on ___ traffic |
|
Definition
|
|
Term
| rerouting traffic using ARP poisoning is an attack on both ___ and ___ |
|
Definition
| functionality and confidentiality |
|
|
Term
| an ARP DoS attack is an attack on the ___ of the network |
|
Definition
|
|
Term
| Describe normal ARP operation |
|
Definition
a router receives a packet to an IP. it sends an ARP request to every host asking if they have that IP Only the host with the requested IP responds with an ARP reply that contains the MAC address. The switch records the MAC and sends the packet for the IP to that MAC. It doesn't use the IP |
|
|
Term
| ARP requests and replies don't require ___ or ___ |
|
Definition
| authentication or verification |
|
|
Term
| ___ uses false ARP replies to map any IP address to any MAC address |
|
Definition
|
|
Term
| With modification spoofed ARP replies can be used to stop all traffic on the LAN as part of a ___ |
|
Definition
|
|
Term
| ARP poisoning can be prevented by using ___ and ___ |
|
Definition
| Static IP tables and Static ARP tables |
|
|
Term
| A ___ can sit outside of corporate walls and attack a wireless LAN |
|
Definition
|
|
Term
| A ___ can be used to intercept and read legitimate traffic |
|
Definition
|
|
Term
| the ___ standard provides access control to prevent illegitimate clients from associating with a network |
|
Definition
|
|
Term
| 802.1X makes the Ethernet workgroup switch the ___ to the network |
|
Definition
|
|
Term
| the 802.1X standard is ___ |
|
Definition
| port based access control |
|
|
Term
| A switch isn't burdened with heavy authentication work. For that a switch relies on ___ |
|
Definition
| central authentication server |
|
|
Term
| A central authentication server has ___ |
|
Definition
| credentials checking authentication data and the processing power needed to check passwords biometrics and other credentials |
|
|
Term
| What are the advantages in using a central authentication server instead of each workgroup switch doing the work? |
|
Definition
Cost savings: reduces the cost of each workgroup switch
Consistency: checking is always the same no matter what workgroup switch the attacker connects to.
Immediate Changes: can immediately access control changes |
|
|
Term
| 802.1X relies on another protocol, the ___ to govern the specifics of authentication interactions. |
|
Definition
| Extensible Authentication Protocol (EAP) |
|
|
Term
| For EAP, authentication messages go between the authentication server and the supplicant. The autheticator switch passes the message through. This is ___ |
|
Definition
|
|
Term
| EAP is called ___ becuase it is easy to add new authentication methods |
|
Definition
|
|
Term
| With pass through operation means once a firm's switches run EAP there is no need to ___ whenever authentication methods change |
|
Definition
|
|
Term
| ___ is a client/server protocol with the authenticator being the client and the central authentication being the server |
|
Definition
|
|
Term
| the RADIUS protocol provides ___ and ___ |
|
Definition
| authentication and authorization |
|
|
Term
| Users connect to wireless LANs via radiowaves to a ___ using ___ standards developed by the ___ |
|
Definition
wireless access point (AP) 802.11 IEEE 802.11 Working Group. |
|
|
Term
| Wireless attacks focus on ___ |
|
Definition
|
|
Term
| Name the three types of wireless network attacks: |
|
Definition
unauthorized network access man in the middle using an evil twin wireless DoS |
|
|
Term
| ___ are unauthorized access points set up by individuals or departments with little or no security |
|
Definition
|
|
Term
| Reasons to prevent unauthorized users from accessing WLAN: |
|
Definition
prevent harm to internal resources prevent external harm that appears to come from your network |
|
|
Term
| ___ is used in order to pick up wireless packets addressed to other hosts. |
|
Definition
| radio frequency monitoring (RFMON) |
|
|
Term
| An attacker can pick up packets in ___ which allows him to receive messages addressed to other users |
|
Definition
|
|
Term
| Focusing electronic attacks on specific high value targets is known as ___ |
|
Definition
|
|
Term
| An ___ is simply a PC that has software to allow it to masquerade as an access point |
|
Definition
|
|
Term
| To address an evil twin threat, some companies require clients coming in via remote access to establish a ___ as well |
|
Definition
|
|
Term
| wireless DoS attacks are designed to affect the ___ of the network |
|
Definition
|
|
Term
| Wireless 802.11 networks transmit on a ___ and/or ___ |
|
Definition
|
|
Term
| Attackers can alter wireless devices to flood frequency bands with ___, AKA ___. This extra ___ damages packages |
|
Definition
electromagnetic interference (EMI) radio frequency interference (RFI) Noise |
|
|
Term
| An attacker can send attack commands to clients, APs or both. These attack commands are actually 802.11 ___ or ___ used to manage the connection of hosts and transmission signals. |
|
Definition
|
|
Term
___ tell other wireless clients that you want to transmit for a given amount of time. ___ tell other clents that you have received an RTS frame and they shouldn't transmit until the designated time expires. |
|
Definition
Request to send (RTS) frame Clear to send (CTS) frame |
|
|
Term
| 802.1X cant't be applied directly to 802.11 wireless LANs. It had to be extended and it is called ___. |
|
Definition
|
|
Term
| EAP has a serious security limitation. What is it? |
|
Definition
| It assumes the connection between the supplicant and the authenticator is secure |
|
|
Term
| To provide security between the wireless client and the access point, and prevent and EAP attack, 802.1X was enhanced to a new standard called ___ |
|
Definition
|
|
Term
| The 802.11i enhancement comes through ___ to add security.In this new security, the authenticator establishes an SSL/TLS secure connection to the wireless client. In this ___, the access point has a digital certificate used to authenticate itself to the client. |
|
Definition
extending EAP standards outer authentication |
|
|
Term
| After the outer authentication, the next step is the wireless client authenticates itself via EAP. This is called ___ |
|
Definition
|
|
Term
| There are two extended EAP standards that are common. What are they and what are they used for. |
|
Definition
EAP-TLS: the inner authentication also uses TLS. This requires the supplicant to have a digital certificate. Secure but expensive.
Protected EAP (PEAP): For inner authentication using PEAP, the client can use any method specified in the EAP standard, ranging from passwords through digital certificates |
|
|
Term
| for 802.11 WLANs, ___ protect communication between the wireless client and the access point. |
|
Definition
| core wireless security protocols |
|
|
Term
| the ___ standards provides basic security between wireless access points and the wireless clients. This turned out to be ___. |
|
Definition
wired equivalent privacy (WEP) fatally flawed |
|
|
Term
| Using WEP is worse than no security because it provides a ___ |
|
Definition
|
|
Term
| WEP mandates ___ meaning the access point and all stations using it use the same key for all cryptographic communications |
|
Definition
|
|
Term
| If an attacker reads two messages encrypted with the same key using RC4, the attacker can find___ immediately. |
|
Definition
|
|
Term
| WEP encrypts each frame with a ___ that consists of the shared RC4 key plus a ___ that is different for each frame. |
|
Definition
per-frame key 24 bit initialization vector (IV) |
|
|
Term
| WPA extends teh security of RC4 primarily by increasing the IV from ___ to ___ |
|
Definition
|
|
Term
| Nearly all wireless access points and wireless network interfaces cards today can support ___ |
|
Definition
|
|
Term
| ___/___ was created for homes or small businesses that only have a single access point |
|
Definition
| Pre Shared Key (PSK)/personal mode |
|
|
Term
| all wireless clients authenticate themselves to the access point using a ___ used by all clients. They are bad for security because people ___ |
|
Definition
shared initial key give them to unauthorized people |
|
|
Term
| After authentication, the access point sends the client an ___ |
|
Definition
|
|
Term
| in 802.11i or WPA in PSK/Personal mode, passphrases must be at least ___ characters long |
|
Definition
|
|
Term
| companies that have central management for their many access points can purchase |
|
Definition
| centralized wireless intrusion detection system software |
|
|
Term
| There are two alternatives to using centralized wireless IDS: Name them . Neither are ___. |
|
Definition
Not worry about intrusion detection walk around with a laptop that has wireless IDS software effective |
|
|
Term
| All 802.11 wireless LAN standards use ___ which spreads the signal over a wide range of frequencies |
|
Definition
| spread spectrum transmission |
|
|
Term
| To work with an access point, a station must know the access point's ___. |
|
Definition
| Service Set Identifier (SSID) |
|
|
Term
| Turning of ___ would seem to offer security. However, even if it is off, the ___ will still be transmitted in the clear in the header of each transmitted ___. |
|
Definition
SSID broadcasting SSID Frame |
|
|
Term
| Changing WEP keys is ___. |
|
Definition
|
|