Chapter 2 Monitoring and Diagnosing Networks Flashcards

1
Q

Network Monitors (sniffers)

A

A machine that watches network traffic and collects data. Nowadays all you need to have is a computer with an NIC in promiscuous mode (picking up all packets that run past it).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Log (event viewer)

A

-Events logged by applications or programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Logs (event viewer)

A
  • Successful and unsuccessful login attempts
  • Events related to creating, opening, and deleting files
  • By default, both successes and failures are not logged. You should change this.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardening

A

Locking down the operating system or your software’s code as much as you practically can

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Services

A

Programs that run on startup, and often are in the background. You should carefully disable any you don’t need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

File and Print Server Security Risks

A
  • Very vulnerable to DoS and access attacks

- Deactivate all ports and protocols you don’t need to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Directory Sharing

A

Should be limited to what’s essential to performing system functions
-Hide root directories from browsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Service Pack

A

Patches that address issues in the operating system that needed major reworking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Updates

A

General fixes with program code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security updates

A

Fix various vulnerabilities that may be found on an operating system. These should be deployed within 30 days of their release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User Account Control

A
  • Disable, but don’t delete, all unneccesary accounts
  • Pay attention not only to domain accounts, but to local accounts as well
  • Make sure set passwords meet the company’s minimum requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Principle of Least Privilege

A

Give employees access to the bare minimum of resources they need to successfully do their jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

802.11x

A

Use MAC Filtering and port authentication together for exponential security increase

Remember, all ports you’re not using can be a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Posture

A

Make sure your security posture baselines are in compliance with HIPAA, ICI, or whoever is setting your standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Audits

A

Scheduled, in-depth checks of security

  • Review security logs and compliance
  • Check security device configuration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remediation Policy

A

When a security gap is found, take note of it and develop a remediation plan.

  • Sample threat classification:
    • Minor: not an immediate threat
    • Serious: Could pose a threat, but that’s very unlikely/difficult
    • Critical: It needs to be taken care of ASAP
17
Q

Alarms

A

An indication of an ongoing current problem

-Good for an issue that should be looked at right away

18
Q

Alert

A

You should pay attention to an alert, but it isn’t an indication of impending doom.

19
Q

Trends

A

Trends in threats you observe, either to your company, or to the networking world at large. These can be used to help you be proactive in your security planning.

20
Q

Enticement vs. Entrapment

A

Enticement: You lure someone into a trap you setup, like a honeypot

Entrapment: Encouraging someone to break the law and reporting them for it.

21
Q

Port 21

A

File Transfer Protocol (FTP)

22
Q

Port 22

A

SSH, SCP and SFTP

23
Q

Port 23

24
Q

Port 25
Port 110
Port 143
Port 995

A

SMTP
POP3
IMAP
Secure POP3

25
Port 53
Domain Name Services (DNS)
26
Port 80 | Port 443
Hypertext Transfer Protocol (HTTP) | Hypertext Transfer Protocol Secure (HTTPS)
27
Port 161
Simple Network Management Protocol (SNMP)
28
Port 631
Internet Printing Protocol (IPP)
29
Port 139
Network Basic Input/output System (NetBIOS)
30
Technical Security Controls
Controls implemented using systems Operating system controls Hardware based
31
Administrative Security Controls
Controls that determine how people act Security Policies Standard operating procedures