IDS / Firewalls / Honeypots Flashcards

1
Q

What is a Stateful Firewall?

A

A firewall that always keeps track of the state of network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Stateless Firewall?

A

A firewall that makes use of data packet’s source, destination, and other parameters to figure out whether the data presents a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?

A

Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are working at the service desk as a network security technician and just received the following email from an end-user who believes a phishing campaign is being attempted.
*****
From: user@diontraining.com
To: abuse@diontraining.com
Subject: You won a free iPhone!
Dear Susan,
You have won a brand new iPhone!
Just click the following link to provide your address so we can ship it out to you this afternoon: (http://www.freephone.io:8080/winner.php)
**
*******
What should you do to prevent any other employees from accessing the link in the email above while still allowing them access to any other webpages at the domain freephone.io?

A. Add DENY IP ANY ANY EQ 8080 to the IPS filter

B. Add DENY TCP http://www.freephone.io ANY EQ 8080 to the firewall ACL

C. Add http://www.freephone.io:8080/winner.php to the browser’s group policy block list

D. Add http://www.freephone.io:8080/winner.php to the load balancer

A

C. Add http://www.freephone.io:8080/winner.php to the browser’s group policy block list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the effective IDS evasion method called where the attacker sends large amount of packets to the target IDS that generates alerts, which enables the attack to hide the real traffic?

A

False Positive Generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?

A

Firewalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In IPSEC, what is the purpose of AH tunnel mode?

A

Provides authentication and integrity, but does not encrypt the packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In IPSEC, what is the purpose of ESP Transport Mode?

A

Encryption of packets to ensure security and confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Remote Access Policy?

A

Serves as a guide for remote users connecting to the network, including via VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Access Control Policy?

A

Set of policies, instructions, and restrictions who can access what data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a VLAN do?

A

It groups collection of device connections from different LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meant by single homed network?

A

Single connection to the ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is meant by dual homed networks?

A

Two links out towards the ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is meant by Multi-homed network?

A

Having at least two links out towards two ISPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4 different types of honeypots?

A
  1. Pure
  2. High-Interaction
  3. Mid-Interaction
  4. Low-Interaction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of access control is used on a router or firewall to limit network activity?

A

Rule-based