CISSP Domain 4 Flashcards

1
Q

What are modes vpn can operate on?

A
  • Transport : Internally, between trusted network, end to end encryption, Provides encryption only to payload
  • Tunnel : Externally , between untrusted networks, provides encryption to payload and ip sec header, link encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different protocols in IPSec ?

A

AH: Provides I, N, Provides session access control and prevents replay attacks
ESP: C, I of payload, limited authentication

Hmac for hashing

IP comp used by IP sec to compress data

Uses hybrid cryptography

IKE - To manage cryptography keys and comprise of :

OAKLEY: Key generation and exchange like D-H key exchange

SKEME: secure key exchange

ISAKMP: Organize and manage key generated by above two

Security association: Agreed on authentication and encryption used by two entities

ISAKMP is used to negotiate and provide authenticated keying material for SA in secure manner

Each IPSec vpn uses 2 SA’s

  1. One for encrypted transmission
  2. One for encrypted reception

This is what enables ipsec to support multiple simultaneous vpns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference between vlan and subnet ?

A

Vlan is created by switches “ Deny by default and allow by exception” whereas subnet using IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are ARP concerns mainly ARP cache poisoning ?

A

It maps ip to mac address translation

ARP cache poisoning : When IP to mac mapping needs to be done it looks at ARP cache table if it’s not there then it send broadcast.

If the owner is there in local subnet it can respond with ARP reply/response

ARP cache poisoning occurs in second step by attacker

  1. ARP graticious or unsolicited replies: Occurs without ARP asking for reply/response
  2. Static IP entries: ARP cache poisoning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Best defence against ARP concerns?

A

Port security in switch
HIDPS
ARP watch
Establish ARP static entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are different modes wifi can be deployed?

A

Ad-hoc mode:(P2P) Without centralized control authority wireless device can communicate

Wifi direct: Upgraded version of ad hoc

Infrastructure mode: Using WAP

Standalone mode: WAP connecting using wireless instead of wire

Wired extension mode

Enterprise extended mode: Multiple WAP used and will use ESSID so that devices can connect even when WAP changes

Bridge mode: Wireless connection to link two wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are different types of wireless security?

A

IEEE802.11 uses OSA and SKA

WEP- RC4
WPA - TKIP
WPA2 and 3 - AES CCMP uses Simultaneous authentication of equals
802.1X support enterprise authentication using EAP which is a framework

WPS is in WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the ways limited radio frequencies can be managed?

Spread spectrum
FHSS
DHSS
OFDM

A

Spread spectrum: Communication occurs over multiple frequencies. Example: Message broken into pieces and sent in different frequencies

FHSS: Transmits data in series across range of frequency, but only frequency at time

DHSS: Employs frequency in parallel. Uses chipping code to allow receiver to reconstruct the data

OFDM: Does not cause interference
Employs a digital multi carrier, allows for more tightly compacted transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blue sniffing

A

Packet capture Bluetooth focused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blue smacking

A

DOS attack through transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blue jacking

A

Sending unsolicited message

Annoyance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Blue snarfing

A

Unauthorised access of data

Data theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blue bugging

A

Remote control over hardware and software if your devices by enabling microphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Difference between NFC and RFID

A

NFC few inches proximity device
RFID few feet

Both are privacy violation technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

War driving

A

To detect wireless network signals, often ones not authorised to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Evil twin

A

Acess point

Hacker operates false access points that will automatically clone or twin identity of an AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Dis-association frames and deauthentication packet

A

Both are WAP related
Dis-association frames used to disconnect from one WAP as it connects another WAP in the same ESSID network. If used maliciously client loses their wireless link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Replay attack

A

Retransmission of captured communications with hope of gaining access to targeted system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How can a screened subnet be implemented?

A

To connect untrusted to trusted network

2 firewalls or 1 multihomed firewall - 1 firewall, 1 interface to internet and 1 to screened subnet , 1 intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Collision domain vs broadcast domsin

A

Two systems transmit data at same time into single transmission path - layer 2

Single system transmits data to multiple recipient - layer 3 and above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Network access control

A

Controlling access control through strict adherence to Enforcement of security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How NAC can be implemented?

A

Pre admission philosophy: Meet all security requirements before granting access

Post admission philosophy: Allow and deny access based on user activity, pre-defined Authorization matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are agent based and agent less NAC ?

A

Agent installed for monitoring

NAC solution performs port scan and compares with baseline from NAC server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Allow listing

A

Default deny, allow by exception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Bastion host
Withstand attack like firewall It's Hardened and exposed to internet
26
Static packet filtering firewall
Message header Destination IP (layer 3) and port address (layer 4) Stateless firewall
27
Application firewall
WAF Works at layer 7
28
Circuit level firewall
**Session layer 5 protocol** Establish connection of circuit Stateless
29
Stateful inspection firewall
Operate at layer 3 and above Stateful **Deep packet inspection** Context analysis
30
ISFW
Microsegmentation
31
Proxy server and 2 types
Protect identity of the client internally Forward proxy : Intermediary for queries of external sources handles query from internal clients Reverse proxy : opp. Handles inbound query from external systems
32
Goal of EDR
**Detect abuses which are more advanced and cannot be detected by traditional AV program** Detect Record Evaluate Respond Caused by problematic software or users
33
MDR
Monitor IT environment quickly detect and resolve threats
34
EPP
Predict prevent detect and respond
35
PPP
Encapsulation of IP traffic over data link layer or dial up Allows multivendor interoperability
36
PAP and CHAP
Password in clear text and challenge response
37
EAP
It's framework rather than protocol mainly used in biometrics, tokens, Smartcards
38
EAP TLS and EAP TTLS
Mutual authentication Creates vpn like tunnel between end points prior to authentication
39
IEEE 803.1X
Authentication technology Makes port based decisions or port based network access control It's based on EAP
40
Port security
Smart patch panel it's like NAC
41
VoIP communication using different phone
VoIP to pstn gateway to be present
42
Phreaking
Targeted towards telephone system and voice services in general
43
PBX and how to add authentication
Telephone switching exchange system deployed in private organisation Direct inward system access
44
Remote access techniques
Service specific: Email control Remote control: Fully control physical system that is distant Remote node operation: remote client establish connectivity to wireless, VPN Screen scraper: **screen scrapped down** 2 meaning remote access, remote control, remote desktop services Virtual desktops or virtual apps 2 - Technology which helps automated tool to interact with HMI
45
Load balancer and types
Used to spread or distribute network traffic load across several network links or network devices across server farm or cluster Active -Active vs Active passive Virtual ips Vs load persistence
46
S/MIME
Email security solution that offers authentication (X.509 digital certificates) and confidentiality (public key encryption)
47
Domain key identified mail
Assert valid mail is sent by an organisation through verification of domain name identity
48
SPF
Data origin using SMTP
49
Domain message authentication reporting and conformance
Dns based email authentication
50
Starttls
Secure SMTP over TLS It's a command
51
Security service provided by VPN and vpn concentrator
Access control, authentication, c, i VPN example of virtualized network Dedicated hardware to support simultaneous vpns
52
Tunneling
Protects contents of inner protocol by encapsulation in another protocol
53
Split Tunnel vs full tunnel
VPN internally and open internet Both vpn enabled
54
Mac flooding and fix
Abuse of switch by flooding of ethernet frames The switch maintains a table called content addressable memory (CAM) Once CAM is full older entries will be dropped and filled with false addresses causing unable to forward Fix: MAC limiting from each jack/port
55
Mac spoofing and fix
**layer 2 can be attacked from within** Changing default mac address to some other values
56
MAC cloning and fix
Impersonate another system Mac filtering is a security mechanism to restrict access Used in WAP and switches
57
PAT
Instead of doing 1:1 map of internal clients to nat we can configure in one port
58
Third party connectivity
MoU -reciprocal handshake agreement ISA- Interconnection security agreement Risk assessment 1. Extranet 2. Private cloud 3. Secure file sharing
59
SDN and how can you fix MITM challenge?
Centrally controlled Separate control plane from the data plane Opens up security challenges like mitm and DoS **can be secured with TLS**
60
SD-Wan
Connectivity from branch offices centrally managed Many networks can be connected- mpls, lte Security: IP sec, vpn tunnels, ngfw, micro segmentation
61
Zigbee
Personal area network for monitoring iot devices During pre configuration a single key might be sent unprotected
62
5 G
Faster speeds , lower latency Does not rely on sim card Stand alone version of 5 G is more secure Old vulnerability related to 4G as it has to work
63
CDN
Geographically distributor network
64
Mesh topology
Redundancy
65
Ring
Centralised Token ring Collision avoidance system
66
Bus
Ethernet Collision detection system
67
Analog Vs digital
Wave shape Bits electrical signal
68
Synchronous Vs Asynchronous
Timing or clocking mechanism embedded in data stream Stop and start, best suited for smaller amount of data example: PSTN
69
Baseband vs broadband
Single transmission- digital signal (ethernet ) vs Multiple simultaneous signals - analog signal( TV)
70
Virtual circuits
Logical pathway or circuit created over a packet switched network between two specific end points
71
Permanent virtual circuits
Dedicated lease line - like walkie talkie SVC to be created each time when needed - like frequency searching radio
72
Broadcast multicast and unicast
Communication to all possible recipients Multiple specific recipients Single communication to single recipient
73
PEAP
EAP+TLS
74
LEAP
Cisco properiatary for wireless and ppp
75
Honeypot
Only Enticement not entrapment Distract from real assets and isolate until you crack them down
76
Teardrop attack
Ddos - Fragmented packet
77
Fraggle attack
Spoofed udp traffic
78
Smurf attack
Spoofed ICMP traffic
79
Land attack
Layer 4 DoS header will same
80
Ping of death
Oversized ping packet
81
Twisted pair and types
Twisted pair cable refers to the fact that it is a pair of wires twisted together in a specific way that creates a **magnetic field, which allows the signal traveling across the wire to remain within the magnetic field**. Additionally, twisted pair cable can be shielded (STP) or unshielded (UTP), with shielded twisted pair offering additional protection from cross talk and interference.
82
Coaxial cable and multiplexing
This is the cable often used by cable companies to bring television, telephone, and high-speed internet access to homes. Coaxial cable consists of a single strand of copper wire sheathed in a protective coating, and a technology called multiplexing allows the wire to provide all the services mentioned. Multiplexing allows the information carried along the wire to be split into different frequencies, waves, and time slices at the same time, and it does so at incredible speeds.
83
Data link core concepts
CORE CONCEPTS Data at the Data Link layer exists as frames. Physical addressing via MAC addresses uniquely identifies devices on a network. Two types of networks: circuit-switched and packet-switched Common location to implement link encryption Layer 2 devices: bridges and switches Layer 2 protocols: L2TP, PPTP, ARP
84
Authentication protocols
PPP ~ PAP Chap EAP PEAP ~ EAP+TLS encapsulated
85
What is convergence
Convergence refers to the ability of native IP networks to carry non-IP traffic via what are known as converged
86
4 security services to secure wireless
To secure wireless communication, four (4) security services are required: access control, authentication, encryption, and integrity protection
87
Fibre channel
Network data storage solutions i.e. SAN or NAS which allows high speed file transfers
88
ISCSI
Network storage based on IP
89
Difference between switch and gun
Switch is mainly L2 and needs port to transmit Signal whereas hub is all ports at layer 1
90
WAN technologies
Circuit switching- Leased lines, PPP, SLIP, ISDN, DSL Packet switching - virtual circuits X.25 frame relay, ATM, SDLC, HDLC