Defense Strategies Flashcards

1
Q

VLAN Hopping is the act of gaining access to traffic on other VLANS that would not normally be accessible by jumping from one VLAN to another.
How do you defend against this?

A

Put unplugged ports on the switch into an unused VLAN
Configure the switch ports in charge of passing tagged frames to be trunks and to explicitly forward specific tags
Pick an unused VLAN as the default VLAN for all trunks, and do not use it for any other intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ping flood is an old type of DoS when an attacker attempts to send many ICMP echo requests (port 7) in an attempt to use up a victims bandwidth.
How do you defend against this?

A

Configure the system not to respond to ICMP Echosq

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smurf attacks send large amounts of ICMP echo requests to the broadcast address of a network (.255) where every computer replies to a spoofed IP (spoof the victims IP, send them the traffic)
How do you defend against this?

A

Configure hosts not to respond to pings or ICMP echoes
Configure routers not to forward packets directed to broadcast addresses
Implement subnetting with smaller subnetworks
Employe network ingress filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fraggle attacks are similar to Smurf attacks except for the traffic is sent via UDP.
How do you defend against this?

A

Configure routers not to forward packets directed to broadcast addresses
Employ network filtering, disabling ports 7 and 19

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SYN flood is the most common type of DoS used in a DDoS. It is when an attacker sends a large amount of SYN requests packets to a server in an attempt to deny service.
How do you protect against this?

A

Recycle half-open connections after a predetermined amount of time
Use IDS to detect the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ping of death is an oversized and malformed packet sent via ICMP to another computer.
How do you defend against this

A

Configure hosts not to respond to pings or ICMP echoes.
Verify operating systems are running the latest service packs and updates.
Update the firmware on any hardware-based firewalls, and update any software-based firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Teardrop attack is a type of DoS which sends mangled IP fragments with overlapping and oversized payloads to the target machine.
How do you defend against this?

A

Upgrade operating systems

Consider third party downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DDoS is when a group of compromised systems attack a single target, causing a DoS to occur at the target host.
How do you defend against this?

A

Update firewalls.
Use IPS.
Utilize a “clean pipe”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spoofing is when an attacker masquerades as another person by falsifying information (Email addresses, MAC addresses, IP addresses, etc)
How do you defend against this?

A

Carefully select applications.
User awareness.
In the case of IP spoofing, incorporate packet filtering and repeat authentication schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Session theft is when an attacker attempts to steal a user’s session using the owner’s cookie and authentication information.
How do you defend against this?

A

Use encryption.

Use CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TCP/IP hijacking is when a hacker takes over a TCP session between two computers without the need of a cookie or any other type of host access.
How do you defend against this?

A

Employ encrypted transport protocols such as SSL, IPsec, and SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MITM is a form of eavesdropping that intercepts all data between a client and a server, relaying that information back and forth.
How do you defend against this?

A

Implement SSL/TLS using a mutually trusted third-party certification authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Replay attacks are when valid data transmissions are maliciously or fraudulently repeated or delayed.
How do you defend against this?

A

Use session tokens.
Implement timestamping and synchronization.
Use a nonce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A null session is a connection to the windows interprocess communications share (IPC$)
How do you defend against this?

A

Update computers

Filter ports 139 and 445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Transitive access is when one computer uses a second computer to attack a third, based on the trust of the second and third computers.
How do you defend against this?

A

Authentication
Firewalls
IDS/IPS
Updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS Poisoning occurs when there is a modification of name resolution information that should be in a DNS server’s cache
How do you defend against this?

A

Use TLS

Utilize secure DNS

17
Q

How do you defend against an unauthorized zone transfer of DNS information from a DNS server?

A

Log the DNS server

Restrict and audit the DNS server

18
Q

How do you defend against an altered hosts file?

A

Change permission on the hosts file to read-only

19
Q

Domain name kiting is the process of deleting a domain name during the 5 day grace period and immediately reregistering it for another 5 day period.
How do you defend against this?

A

Not many ways to defend against this other than charging fees for domain name kiting

20
Q

MAC Flooding is when numerous packets are sent to a switch, each of which has a different source MAC address, in an attempt to use up the memory on the switch.
How do you defend against this?

A

Implement 802.1x (SSO)
Use port security
Implement dynamic VLANS and NIDS
Consistently monitor the network