D6 Network and Communications Security Flashcards
Chris is building an Ethernet network and knows that he needs to span a distance of more than 150 meters with his 1000BaseT network. What network technology should he use to help with this?
A. Install a repeater or a concentrator before 100 meters.
B. Use Category 7 cable, which has better shielding for higher speeds.
C. Install a gateway to handle the distance.
D. Use STP cable to handle the longer distance at high speeds.
A. Install a repeater or a concentrator before 100 meters.
Explanation
A repeater or concentrator will amplify the signal, ensuring that the 100‐meter distance limitation of 1000BaseT is not an issue. A gateway would be useful if network protocols were changing, while Cat7 cable is appropriate for a 10Gbps network at much shorter distances. STP cable is limited to 155 Mbps and 100 meters, which would leave Chris with network problems.
What topology correctly describes Ethernet?
A. A ring
B. A star
C. A mesh
D. A bus
D. A bus
Explanation
Ethernet uses a bus topology. While devices may be physically connected to a switch in a physical topology that looks like a star, systems using Ethernet can all transmit on the bus simultaneously, possibly leading to collisions.
During a wireless network penetration test, Susan runs aircrack‐ng against the network using a password file. What might cause her to fail in her password‐cracking efforts?
A. Use of WPA2 encryption
B. Running WPA2 in Enterprise mode
C. Use of WEP encryption
D. Running WPA2 in PSK mode
B. Running WPA2 in Enterprise mode
Explanation
WPA2 enterprise uses RADIUS authentication for users rather than a preshared key. This means a password attack is more likely to fail as password attempts for a given user may result in account lockout. WPA2 encryption will not stop a password attack, and WPA2’s preshared key mode is specifically targeted by password attacks that attempt to find the key. Not only is WEP encryption outdated, but it can also frequently be cracked quickly by tools like aircrack‐ng.
Which OSI layer includes electrical specifications, protocols, and interface standards?
A. The Transport layer
B. The Device layer
C. The Physical layer
D. The Data Link layer
C. The Physical layer
Explanation
The Physical layer includes electrical specifications, protocols, and standards that allow control of throughput, handling line noise, and a variety of other electrical interface and signaling requirements. The OSI layer doesn’t have a Device layer. The Transport layer connects the Network and Session layers, and the Data Link layer packages packets from the network layer for transmission and receipt by devices operating on the Physical layer.
Sarah is manually reviewing a packet capture of TCP traffic and finds that a system is setting the RST flag in the TCP packets it sends repeatedly during a short period of time. What does this flag mean in the TCP packet header?
A. RST flags mean “Rest.” The server needs traffic to briefly pause.
B. RST flags mean “Relay‐set.” The packets will be forwarded to the address set in the packet.
C. RST flags mean “Resume Standard.” Communications will resume in their normal format.
D. RST means “Reset.” The TCP session will be disconnected.
D. RST means “Reset.” The TCP session will be disconnected.
Explanation
The RST flag is used to reset or disconnect a session. It can be resumed by restarting the connection via a new three‐way handshake.
Sue’s organization recently failed a security assessment because their network was a single flat broadcast domain, and sniffing traffic was possible between different functional groups. What solution should she recommend to help prevent the issues that were identified?
A. Use VLANs.
B. Change the subnet mask for all systems.
C. Deploy gateways.
D. Turn on port security.
A. Use VLANs.
Explanation
A well‐designed set of VLANs based on functional groupings will logically separate segments of the network, making it difficult to have data exposure issues between VLANs. Changing the subnet mask will only modify the broadcast domain and will not fix issues with packet sniffing. Gateways would be appropriate if network protocols were different on different segments. Port security is designed to limit which systems can connect to a given port.
Lauren wants to provide port‐based authentication on her network to ensure that clients must authenticate before using the network. What technology is an appropriate solution for this requirement?
A. 802.11a
B. 802.3
C. 802.15.1
D. 802.1x
D. 802.1x
Explanation
802.1x provides port‐based authentication and can be used with technologies like EAP, the Extensible Authentication Protocol. 802.11a is a wireless standard, 802.3 is the standard for Ethernet, and 802.15.1 was the original Bluetooth IEEE standard.
Michelle knows that WEP is no longer used in modern wireless networks, but she needs to explain the problem with WEP to a customer who has an older wireless network still in production that must be upgraded to be secure. What issue should she explain to the customer?
A. WEP does not provide encryption and instead uses hashing for security.
B. WEP uses DES encryption and is not secure because DES is easily crackable.
C. WEP provides data encryption for only part of the traffic sent to clients.
D. WEP uses an initialization vector that is too small and does not change.
D. WEP uses an initialization vector that is too small and does not change.
Explanation
WEP uses an initialization vector (IV) that is too short, making it relatively trivial to brute‐force. The IV is also static, meaning that key streams will repeat after a short period of time, giving attackers who have dwell time in a network sufficient opportunity to capture traffic and then crack the key. Hashes don’t work to secure traffic since they are a one‐way function. WEP uses RC4, not DES, and encrypts data traffic fully to clients, but it uses weak encryption, making it unsuitable to provide secure connectivity.
Which one of the following protocols is commonly used to provide backend authentication services for a VPN?
A. HTTPS
B. RADIUS
C. ESP
D. AH
B. RADIUS
Explanation
The Remote Authentication Dial‐in User Service (RADIUS) protocol was originally designed to support dial‐up modem connections but is still commonly used for VPN‐based authentication. HTTPS is not an authentication protocol. ESP and AH are IPsec protocols but do not provide authentication services for other systems.
Ben is troubleshooting a network and discovers that the NAT router he is connected to has the 192.168.x.x subnet as its internal network and that its external IP is 192.168.1.40. What problem is he encountering?
A. 192.168.x.x is a nonroutable network and will not be carried to the Internet.
B. 192.168.1.40 is not a valid address because it is reserved by RFC 1918.
C. Double NATing is not possible using the same IP range.
D. The upstream system is unable to de‐encapsulate his packets, and he needs to use PAT instead.
C. Double NATing is not possible using the same IP range.
Explanation
Double NATing isn’t possible with the same IP range; the same IP addresses cannot appear inside and outside a NAT router. RFC 1918 addresses are reserved, but only so they are not used and routable on the Internet, and changing to PAT would not fix the issue.
Susan sets up a firewall that keeps track of the status of the communication between two systems and allows a remote system to respond to a local system after the local system starts communication. What type of firewall is Susan using?
A. A static packet filtering firewall
B. An application‐level gateway firewall
C. A stateful packet inspection firewall
D. A circuit‐level gateway firewall
C. A stateful packet inspection firewall
Explanation
Stateful packet inspection firewalls, also known as dynamic packet filtering firewalls, track the state of a conversation and can allow a response from a remote system based on an internal system being allowed to start the communication. Static packet filtering and circuit‐level gateways only filter based on source, destination, and ports, whereas application‐level gateway firewalls proxy traffic for specific applications.
What type of networking device is most commonly used to assign endpoint systems to VLANs?
A. Firewall
B. Router
C. Switch
D. Hub
C. Switch
Explanation
The assignment of endpoint systems to VLANs is normally performed by a network switch.
Chris needs to design a firewall architecture that can support a DMZ, a database, and a private internal network in a secure manner that separates each function. What type of design should he use, and how many firewalls does he need?
A. A four‐tier firewall design with two firewalls
B. A two‐tier firewall design with three firewalls
C. A three‐tier firewall design with at least one firewall
D. A single‐tier firewall design with three firewalls
C. A three‐tier firewall design with at least one firewall
Explanation
A three‐tier design separates three distinct protected zones and can be accomplished with a single firewall that has multiple interfaces. Single‐ and two‐tier designs don’t support the number of protected networks needed in this scenario, while a four‐tier design would provide a tier that isn’t needed.
Which of the following is not a potential problem with active wireless scanning?
A. Accidently scanning apparent rogue devices that actually belong to guests
B. Causing alarms on the organization’s wireless IPS
C. Scanning devices that belong to nearby organizations
D. Misidentifying rogue devices
B. Causing alarms on the organization’s wireless IPS
Explanation
Not only should active scanning be expected to cause wireless IPS alarms, but they may actually be desired if the test is done to test responses. Accidentally scanning guests or neighbours or misidentifying devices belonging to third parties are all potential problems with active scanning and require the security assessor to carefully verify the systems that she is scanning.
Chris is configuring an IDS to monitor for unencrypted FTP traffic. What ports should Chris use in his configuration?
A. TCP 20 and 21
B. TCP 21 only
C. UDP port 69
D. TCP port 21 and UDP port 21
A. TCP 20 and 21
Explanation
The File Transfer Protocol (FTP) operates on TCP ports 20 and 21. UDP port 69 is used for the Trivial File Transfer Protocol, or TFTP, while UDP port 21 is not used for any common file transfer protocol.
During a penetration test, Lauren is asked to test the organization’s Bluetooth security. Which of the following is not a concern she should explain to her employers?
A. Bluetooth scanning can be time‐consuming.
B. Many devices that may be scanned are likely to be personal devices.
C. Bluetooth passive scans may require multiple visits at different times to identify all targets.
D. Bluetooth active scans can’t evaluate the security mode of Bluetooth devices.
D. Bluetooth active scans can’t evaluate the security mode of Bluetooth devices.
Explanation
Bluetooth active scans can determine both the strength of the PIN and what security mode the device is operating in. Unfortunately, Bluetooth scans can be challenging because of the limited range of Bluetooth and the prevalence of personally owned Bluetooth‐enabled devices. Passive Bluetooth scanning only detects active connections and typically requires multiple visits to have a chance of identifying all devices.
The Windows ipconfig command displays the following information:
BC‐5F‐F4‐7B‐4B‐7D
What term describes this, and what information can usually be gathered from it?
A. The IP address, the network location of the system
B. The MAC address, the network interface card’s manufacturer
C. The MAC address, the media type in use
D. The IPv6 client ID, the network interface card’s manufacturer
B. The MAC address, the network interface card’s manufacturer
Explanation
Media Access Control (MAC) addresses are the hardware address the machine uses for layer 2 communications. The MAC addresses include an organizationally unique identifier (OUI), which identifies the manufacturer. MAC addresses can be changed, so this is not a guarantee of accuracy, but under normal circumstances you can tell what manufacturer made the device by using the MAC address.
Why should passive scanning be conducted in addition to implementing wireless security technologies like wireless intrusion detection systems?
A. It can help identify rogue devices.
B. It can test the security of the wireless network via scripted attacks.
C. Their short dwell time on each wireless channel can allow them to capture more packets.
D. They can help test wireless IDS or IPS systems.
A. It can help identify rogue devices.
Explanation
Passive scanning can help identify rogue devices by capturing MAC address vendor IDs that do not match deployed devices, by verifying that systems match inventories of organizationally owned hardware by hardware address, and by monitoring for rogue SSIDs or connections.
Lauren’s organization has deployed VoIP phones on the same switches that the desktop PCs are on. What security issue could this create, and what solution would help?
A. VLAN hopping; use physically separate switches.
B. VLAN hopping; use encryption.
C. Caller ID spoofing; MAC filtering
D. Denial‐of‐service attacks; use a firewall between networks.
A. VLAN hopping; use physically separate switches.
Explanation
VLAN hopping between the voice and computer VLANs can be accomplished when devices share the same switch infrastructure. Using physically separate switches can prevent this attack. Encryption won’t help with VLAN hopping because it relies on header data that the switch needs to read (and this is unencrypted), while Caller ID spoofing is an inherent problem with VoIP systems. A denial of service is always a possibility, but it isn’t specifically a VoIP issue and a firewall may not stop the problem if it’s on a port that must be allowed through.
Which one of the following traffic types should not be blocked by an organization’s egress filtering policy?
A. Traffic destined to a private IP address
B. Traffic with a broadcast destination
C. Traffic with a source address from an external network
D. Traffic with a destination address on an external network
D. Traffic with a destination address on an external network
Explanation
Egress filtering scans outbound traffic for potential security policy violations. This includes traffic with a private IP address as the destination, traffic with a broadcast address as the destination, and traffic that has a falsified source address not belonging to the organization.
A denial‐of‐service (DoS) attack that sends fragmented TCP packets is known as what kind of attack?
A. Christmas tree
B. Teardrop
C. Stack killer
D. Frag grenade
B. Teardrop
Explanation
A teardrop attack uses fragmented packets to target a flaw in how the TCP stack on a system handles fragment reassembly. If the attack is successful, the TCP stack fails, resulting in a denial of service. Christmas tree attacks set all of the possible TCP flags on a packet, thus “lighting it up like a Christmas tree.” Stack killer and frag grenade attacks are made‐up answers.
Angela uses a sniffer to monitor traffic from a RADIUS server configured with default settings. What protocol should she monitor, and what traffic will she be able to read?
A. UDP, none. All RADIUS traffic is encrypted
B. TCP, all traffic but the passwords, which are encrypted
C. UDP, all traffic but the passwords, which are encrypted.
D. TCP, none. All RADIUS traffic is encrypted.
C. UDP, all traffic but the passwords, which are encrypted.
Explanation
By default, RADIUS uses UDP and only encrypts passwords. RADIUS supports TCP and TLS, but this is not a default setting.
Segmentation, sequencing, and error checking all occur at what layer of the OSI model that is associated with SSL, TLS, and UDP?
A. The Transport layer
B. The Network layer
C. The Session layer
D. The Presentation layer
A. The Transport layer
Explanation
The Transport layer provides logical connections between devices, including end‐to‐end transport services to ensure that data is delivered. Transport layer protocols include TCP, UDP, SSL, and TLS.
What type of key does WEP use to encrypt wireless communications?
A. An asymmetric key
B. Unique key sets for each host
C. A predefined shared static key
D. Unique asymmetric keys for each host
C. A predefined shared static key
Explanation
WEP has a weak security model that relies on a single, predefined, shared static key. This means that modern attacks can break WEP encryption in less than a minute.