Chapter 12- Secure Communications and Network Attacks Flashcards

1
Q
  1. List some protocols that provide security services for application specific communications i.e. secure communications protocols: Internet Protocol Security (IPSec)
A
  • Kerberos
  • Secure Shell
  • Signal Protocol
  • Secure Remote Procedure Call (S-RPC)
  • Secure Socket Layer (SSL)
  • Transport Layer Security (TLS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Describe IPSec:
A

Internet Protocol Security (IPSec) uses public key cryptography to provide encryption, access control, non-repudiation and message authentication all using IP based protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Describe Kerberos:
A

Kerberos offers a single sign on solution for users and provides protection for log on credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What is Secure Remote Procedure Call (S-RPC)?
A

Secure Remote Procedure Call (S-RPC) is an authentication service and is simply a means to prevent unauthorised execution of code on remote systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What is Secure Socket Layer (SSL)?
A

Secure Socket Layer (SSL) is an encryption protocol to protect communications between web server and web browser.
• SSL can be used to secure web, email, File Transfer Protocol (FTP) or even Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is Transport Layer Security (TLS)?
A

Transport Layer Security uses stronger authentication and encryption protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Similarities of TSL and SSL: both secure client server communications across insecure network
A
  • Support one way authentication
  • Support 2way authentication using digital certificates
  • Implemented at the initial payload of a TCP package, alloing it to encapsulate higher payloads
  • Can be implemented at lower levels (e.g. layer 3) i.e. open VPN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Advantages of TLS:
A

it can be used to encrypt User Datagram Protocol (UDP) and Session Initiation Protocol (SIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. List some authentication protocols:
A

CHAP, PAP, EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Explain Challenge Handshake Authentication Protocol (CHAP):
A

Challenge Handhsake Authentication Protocol (CHAP) is on of the protocols uses over Point-to-Point Protocol (PPP)
• Encrypts user names and passwords
• This activity is transparent to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What is Point-to-Point Protocol?
A

Point-to-Point Protocol is a data link 2 communication protocol between 2 routers directly without any host or any other networking in between.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What is Password Authentication Protocol (PAP)?
A

Password Authentication Protocol (PAP) is a standardised authentication protocol for PPP. PAP offers no encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is Extensible Authentication Protocol?
A

Extensible Authentication Protocol (EAP) is a framework for authentication rather thana protocol. It allows customised authentication security solutions e.g. tokens, biometrics etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. PBX means
A

Private Branch Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. PSTN means
A

Public Switched Telephone Network (PSTN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Vulnerabilities of Public Branch Exchange (PBX) and Public Switched Telephone Network (PSTN) are voice communications are vulnerable to
A

interception, eavesdropping, tapping etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Phreakers are:
A

Phreakers are malicious attackers that abuse phone systems. Phreakers may be able to gain unauthorized access to personal voice mailboxes, redirect messages, block access, and redirect inbound and outbound calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. What is Instant Messaging (IM)?
A

Instant Messaging (IM) is a mechanism that allows for real time text based chat between 2 users located anywhere on the internet. E.g. Facebook, Skype, Google hangouts etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Use of Simple Mail Transfer Protocol (SMTP) are:
A

Simple Mail Transfer Protocol (SMTP) are used to accept messages from clients, transport those messages to servers and deposit them into user’s server based inbox transfer.
• Sender Policy Framework can be used to configure SMTP servers to protect against Spam and email spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. _________ is the most common SMTP server for Unix systems, and ________ is the most common SMTP server for Microsoft systems.:
A

Sendmail, Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. List some email security solutions:
A

Secure Multipurpose Internet Mail Extensions (S/MIME).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. Describe Secure Multipurpose Internet Mail extension (S/MIME) messages:
A

: S/MIME Signed messages: provides integrity, sender authentication and nonrepudiation.
• An enveloped message provides integrity, sender authentication and confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. MOSS means
A

MIME Object Security Services (MOSS)
• *MIME means Multipurpose Internet Mail Extensions
• MOSS used RC4, MD2, MD 5, RSA and DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. MIME Object Security Services (MOSS) can provide ____,____,____and ____ for email messages.
A

authentication, confidentiality, integrity, and nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. Explain Simple Multipurpose Internet Mail Extensions S/MIME) messages:
A

S/MIME Signed messages: provides integrity, sender authentication and nonrepudiation.
• An enveloped message provides integrity, sender authentication and confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. What is Privacy Enhanced Mail (PEM)?
A

Privacy Enhanced Mail is an email encryption mechanism that provides authentication, integrity, confidentiality and non-repudiation.
PEM uses X.509, RSA, DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. What is Pretty Good Privacy (PGP)
A

Pretty Good Privacy (PGP) is a public-private key system that uses a variety of encryption algorithms to encrypt files and email messages. It uses RSA, IDEA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. List 2 types of dial up protocols:
A

Point to Point Protocol (PPP) and Serial Line Internet Protocol (SLIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. List 2 Centralised Remote Authentication Services:
A

Remote Authentication Dial In User Service (RADIUS)

Terminal Access Controller Access Control System (TACACS+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. What is VPN?
A

A virtual private network (VPN) is a communication tunnel that provides point-to-point transmission of both authentication and data traffic over an intermediary untrusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. What is tunnelling?
A

Tunnelling is the network communications process that protects the contents of protocol packets by encapsulating them in packets of another protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. Disadvantages of tunnelling are?
A

Tunnelling creates larger packets

• Is a point to point communication and is not designed to handle broadcast traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. Point to Point Tunnelling Protocol is supported by?
A

• Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
• Challenge Handshake Authentication Protocol (CHAP)
• Password Authentication Protocol (PAP)
• Extensible Authentication Protocol (EAP)
• Shiva Password Authentication Protocol (SPAP)
The initial tunnel negotiation process used by PPTP is not encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. List some common VPN protocols:
A

: L2TP, PPP, L2F, IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  1. What is Point to Point Tunnelling Protocol (PPTP)?
A

Point to Point Tunnelling Protocol (PPTP) is an encapsulation protocol developed from the dial up Point to Point Protocol. It operates at Data Layer (Layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  1. What is L2F?
A

Layer 2 Forwarding (L2F) is a mutual authentication tunnelling mechanism. It does not offer encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  1. What is Layer 2 Tunnelling Protocol (L2TP):
A

Layer 2 Tunnelling Protocol is derived from PPTP AND L2F. It lacks built in encryption but relies on IPsec as its security mechanism. It also supports RADIUS and TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
  1. Describe IPsec Protocol
A

Is both a standalone VPN and part of the L2TP security mechanism. It has security elements of IPv6 crafted into an add on package for IPv4. It has 2 primary components:
• Authentication Header provides authentication, integrity and non-repudiation
• Encapsulating payload provides for encryption to protect the confidentiality of transmitted data, but it also provides limited authentication. It operates at Network Layer (Layer 3)
• It can be used in transport mode or tunnel mode.
• In transport mode, the IP packet data is encrypted but the header of the packet is not
• In tunnel mode, the entire IP packet is encrypted, and a new header is added to the packet to govern transmission through the tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. What is Virtual LAN?
A

A Virtual Local Area Network (VLAN) is a hardware imposed network segmentation created by switches.
• VLANs can also be assigned or created based on device MAC address, mirroring the IP subnetting, around specified protocols, or based on authentication.
• VLANs let you control and restrict broadcast traffic and reduce a network’s vulnerability to sniffers because a switch treats each VLAN as a separate network division
• VLANs operate at layer 2
• VLANs work like subnets, but keep in mind that they are not actual subnets. VLANs are created by switches at layer 2. Subnets are created by IP address and subnet mask assignments at layer 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  1. What is virtualisation?
A

Virtualisation is the technology that is used to host one or more operating systems within the memory of a single host computer. E.g. VMware, Hyper-V etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  1. Advantages of virtualisation:
A

real time scalability, easier and faster backups, malicious code compromise hardly affect host OS, allows safe testing and experimentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
  1. What is VM escaping?
A

VM escaping occurs when software within a guest OS is able to breach isolation protection provided by the hypervisor in order to violate the container of other OSs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
  1. How to control VM escaping:
A

keep highly sensitive systems and data on a separate physical machine, regularly patch hypervisor software, monitor attack and exposure.

44
Q
  1. What is virtual application?
A

Virtual application is a software product deployed in such a way that is fooled to believing that it is interacting with a full host OS.

45
Q
  1. Virtual desktop refer to:
A

Virtual desktop refers to remote access tool that grants the user access to a distant computer.
• Extension of virtual application concept encapsulating multiple applications and some form of portability or cross OS function
• Extended desktop larger than display that allows user to employ multiple application layouts.

46
Q
  1. What is network virtualisation
A

A virtualized network or network virtualization is the combination of hardware and software networking components into a single integrated entity.

47
Q
  1. What is Network Address Translation (NAT)?
A

The goals of hiding the identity of internal clients, masking the design of your private network, and keeping public IP address leasing costs to a minimum.
• NAT is a mechanism for converting the internal IP addresses found in packet headers into public IP addresses for transmission over the internet.

48
Q
  1. What is stateful NAT?
A

Network Address Translation (NAT) operates by maintaining mapping requests made by internal clients.
• A client’s internal IP address
• And the IP address of the internet service contacted
• Mapping address of the internal service contacted.

49
Q
  1. What is PAT?
A

Port Address Translation (PAT) is the multiplexing form of NAT. NAT is also known as NAT overloading.

50
Q
  1. Explain the 2 modes of Network Address Translation:
A

Network Address Translation occurs as: static NAT or Dynamic NAT
Static NAT: this occurs when a specific internal client’s IP address is assigned a permanent mapping to a specific external public IP address
Dynamic NAT: uses to grant multiple internal clients access to a few leased public IP addresses.

51
Q
  1. Is NAT directly compatible with IPsec?
A

Network Address Translation (NAT) is not directly compatible with IPsec because it modifies packet headers, which IPsec relies on to prevent security violations. NAT transversal (RFC 3947) was designed to support IPsec VPNs.

52
Q
  1. What is Automatic Private IP Addressing?
A

Automatic Private IP Addressing (APIPA) aka local link local address assignment assigns an IP address to a system in the event of Dynamic Host Configuration Protocol (DHCP) assignment failure.

53
Q
  1. What is circuit switching?
A

Circuit switching involves a dedicated physical pathway created between 2 communicating parties.

54
Q
  1. What is Packet switching:
A

Packet switching occurs when the message or communications is broken up into small segments and sent across intermediary networks to the destination.

55
Q
  1. Difference between packet switching and circuit switching are:
A

Circuit Switching: Constant traffic. fixed known delays, connection oriented, sensitive to connection loss, used primarily for voice.

Packet Switching: Bursty traffic, variable delays, connectionless, sensitive to data loss, used for any type of traffic.

56
Q
  1. What is Permanent Virtual Circuit (PVC)?
A

Permanent Virtual Circuit (PVC) is like a dedicated leased line, logical circuit always exists and is waiting for customer to send data.,

57
Q
  1. What is Switched Virtual Circuit:
A

Switched Virtual Circuit is like a dial up connection because virtual circuit has to be created using the best paths currently available before it can be used and then disassembled after the transmission is complete.

58
Q
  1. What are the 2 types of virtual circuit within a packet switching circuit:
A

Permanent Virtual Circuit (PVC) and Switched Virtual Circuit (SVC).

59
Q
  1. Describe Wide Area Network (WAN)?
A

Wide Area Network (WAN) is used to connect distant network nodes and individual devices together.

60
Q
  1. What is a dedicated line?
A

Dedicated Line is one that is hard to define and is continually reserved for use by a customer. A dedicated line is always on and waiting for traffic to be transmitted over it.

61
Q
  1. What is a nondedicated line?
A

Nondedicated line requires connection to be established before data transmission can occur e.g. Digital Subscriber Line (DSL), standard modems and Integrated Services Digital Network (ISDN).

62
Q
  1. What is Integrated Services Digital Network (ISDN)?
A

Integrated Services Digital Network is a fully digital telephone network that supports both voice and high speed data communications.

63
Q
  1. What are the 2 standard types of ISDN?
A

Basic Rate Interface (BRI) and Primary Rate Interface (PRI)

64
Q
  1. What is Basic Rate Interface?
A

Basic Rate Interface (BRI) offers customers a connection between 2 B channels and 1 D channel. B channels are used for data transmission. D channels are used for call management, establishment and deardown.

65
Q
  1. What are Channel Service Unit?
A

Channel Service Unit convert LAN signals into format used by WAN carrier network and vice versa. It is also known as Data Service Unit (DSU).

66
Q
  1. What is X.25 WAN?
A

X.25 WAN uses Permanent Virtual Switching (PVS) to establish specific point-to-point connections between two networks. It has low performance and throughput compared to Frame Relay.

67
Q
  1. What are Frame Relay Connections?
A

Frame Relay is a layer 2 connection mechanism that uses packet switching technology to establish virtual circuits between communication endpoints.

68
Q
  1. What is Committed Information Rate (CIR)?
A

Committed Information Rate (CIR) is the minimum bandwidth a service provider grants to its customers.
• It is significantly less than the actual maximum capability of the provider network.
• The service network provider may allow customers to exceed their CIR over short intervals when additional bandwidth is available.

69
Q
  1. What is Asynchronous Transfer Mode (ATM)?
A

Asynchronous Transfer Mode it fragments communications into fixed length 53 byte cells. These fixed lengths allows ATM to be very efficient and offer high throughputs.
• ATMs can use either PVCs or SVCs

70
Q
  1. What is Switched Multimegabit Data Service (SMDS):
A

this is a connectionless packet switching technology. SMDS is used to connect multiple LANs to form a Metropolitan Area Network (MAN)

71
Q
  1. SDH means____ and SONET means :
A

SDH Synchronous Digital Hierarchy, SONET- Synchronous Optical Network.

72
Q
  1. What are Synchronous Digital Hierarchy (SDH) and Synchronous Optical Network (SONET
A

Synchronous Digital Hierarchy (SDH) and Synchronous Optical Network (SONET) are hardware or physical layer standards defining infrastructure and line speed requirements.
• SDDH and SONET support both mesh and ring topologies

73
Q
  1. List 3 Specialised Protocols:
A

Synchronous Data Link Control (SDLC), High-Level Data Link Control (HDLC) and HSSI

74
Q
  1. What is Synchronous Data Link Control (SDLC)?
A

Synchronous Data Link Control is used on permanent physical connections of dedicated leased lines to provide connectivity for mainframes.
• Uses polling
• It operates in Data Layer (Layer 2)

75
Q
  1. What is High-Level Data Link Control (HDLC)?
A

High- Level Data link control is a refined version of the Serial Level Data Link designed specifically for serial synchronous connections.
• It supports full duplex communications and supports both point to point and multipoint connections.
• Operates on OSI layer 2 (Data Link Layer)
• Offers flow control and includes error detection.

76
Q
  1. What is transparency as a security control characteristic?
A

Transparency is a characteristic of a service, service control or access mechanism that ensures that is unseen by users.

77
Q
  1. What do you do to verify the integrity of a transmission?
A

use a checksum or hash. The hash total obtained is added to the end of the message and is called the message digest.

78
Q
  1. what is transmission logging?
A

transmission logging records the particulars about the source, destination and time stamps etc this information can be useful in troubleshooting problems and tracking down unauthorised communications.

79
Q
  1. what is security boundary?
A

security boundary is the line of intersection between 2 areas, subnets or environments that have different security requirements or needs.

80
Q
  1. what are logical security boundaries?
A

Logical security boundaries are the points where electronic communications interface with devices or services for which your organization is legally responsible.

81
Q
  1. what is a security perimeter?
A

The security perimeter in the physical environment is often a reflection of the security perimeter of the logical environment.

82
Q
  1. what is Denial of Service (DoS)?
A

Attacks on exploiting a vulnerability in the system.

83
Q
  1. Explain the basic forms of Denial of Service (DoS):
A

Attacks on exploiting a vulnerability in the system.

Attacks that flood the victim’s communication pipeline with garbage network traffic

84
Q
  1. What is Distributed Denial of Service (DDoS)?
A

Distributed Denial of Service attacks involves the deployment of remote control tools e.g. bots, zombies etc.

85
Q
  1. What are botnets?
A

Botnets is a network of computers infected by malware that are under the control of a single attacking party. Botnets is the deployments of numerous bots or zombies across numerous unsuspecting victims.

86
Q
  1. What is eavesdropping?
A

Eavesdropping is simply listening to communication traffic for the purpose of duplicating it. The duplication can take the form of recording data to a storage device or using an extraction program that dynamically attempts to extract the original content from the traffic stream. they are difficult to detect and are known as passive attacks.
• When eavesdropping or wiretapping is transformed into altering or injecting communications, the attack is considered an active attack.

87
Q
  1. How to prevent eavesdropping?
A

physical access control to prevent unauthorised personnel from accessing out IT infrastructure.
• one time pads or tokens
• encryption e.g. IPsec, SSH

88
Q
  1. What is impersonation or masquerading?
A

Impersonation or masquerading is the act of pretending to be someone or something you are not to gain unauthorized access to a system. e.g. authentication credentials may have been stolen

89
Q
  1. How to prevent impersonation?
A

use onetime pads and token authentication systems
• use Kerberos
• use encryption

90
Q
  1. What are replay attacks?
A

Replay Attacks attempt to re-establish a communication session by replaying captured traffic against a system.

91
Q
  1. How to prevent replay attacks:
A

use onetime authentication mechanisms and sequenced session identification.

92
Q
  1. What are modification attacks?
A

Modification attacks is a process where captured packets are altered and then played against a system. The modified packets are designed to bypass the restriction of improved authentication mechanisms and session sequencing.

93
Q
  1. What are address resolution protocol spoofing?
A

Address Resolution Protocol (ARP) is used to discover the MAC address of a system by polling using its IP address. ARP attacks are often an element in man-in-the-middle attacks. Such attacks involve an intruder’s system spoofing its MAC address against the destination’s IP address into the source’s ARP cache.

94
Q
  1. List 2 examples of resolution attacks:
A

Domain Name Systems (DNS) poisoning and DNS Spoofing

95
Q
  1. What is Domain Name System poisoning?
A

Domain Name System poisoning occurs when an attacker alters the Domain name to IP address mapping in a DNS system to redirect traffic to a rogue system or simply perform a denial of service against the system.

96
Q
  1. What is Domain Name System (DNS) Spoofing?
A

Domain Name System (DNS) Spoofing occurs when an attacker sends false replies to a requesting system, beating the real reply from a valid DNS server.
• This is also technically an exploitation of race conditions

97
Q
  1. How to protect against DNS spoofing and poisoning?
A

allow only authorised changes to DNS.
• restrict zone transfers
• log all privileged DNS activity.

98
Q
  1. How to prevent DNS Hijacking vulnerability:
A

upgrade DNS to Domain Name System Security Extensions (DNSSEC)

99
Q
  1. What is Hyperlink Spoofing?
A

Hyperlink Spoofing is used to redirect traffic to a rogue or imposter system or to simply divert traffic away from the intended destination.
• It can take the form of DNS spoofing or simply divert traffic from its intended destination.
• Phishing is another attack that commonly involves hyperlink spoofing. The term means fishing for information. Phishing attacks can take many forms, including the use of false URLs.

100
Q
  1. what is pretexting:
A

this is a social engineering technique that manipulates victims into divulging information. A pretext is a made-up scenario developed by threat actors for the purpose of stealing victim’s personal data. it is related to phishing.

101
Q
  1. What is phishing?
A

Phishing involves impersonating a trusted entity in communications like emails or text messages in order to obtain sensitive information like payment card details and passwords.

102
Q

a

A

a

103
Q

a

A

a

104
Q

a

A

a

105
Q

a

A

a

106
Q

a

A

a

107
Q

a

A

a