Lesson 16: Configuring SOHO Network Security Flashcards
‘Confidentiality’ and ‘Integrity’ are two important properties of information stored in a secure retrieval system. What is the third property?
‘Availability’.
Explanation: ‘availability’ is the information that is inaccessible is not of much use to authorized users. For example, a secure system must protect against ‘denial of service’ (DoS) attacks.
True or false? The level of risk from ‘zero-day’ attacks is only significant with respect to EOL systems.
False
Explanation: A ‘zero-day’ is a vulnerability that is unknown to the product vendor and means that no patch is available to mitigate it. This can affect currently supported as well as unsupported ‘end-of-life’ (EOL) systems.
The main difference is that there is a good chance of a patch being developed if the system is still supported, but almost no chance if it is EOL.
A threat actor crafts an email addressed to a senior support technician inviting him to register for free football coaching advice. The website contains password-stealing malware. What is the name of this type of attack?
Phishing Attack
Explanation: A ‘phishing attack’ tries to make users authenticate with a fake resource, such as a website. Phishing emails are often sent in mass as spam. This is a variant of phishing called spear phishing because it is specifically targeted at a single person, using personal information known about the subject (his or her football-coaching volunteer work).
You are assisting with the development of ‘end-user’ security awareness documentation. What is the difference between tailgating and shoulder surfing?
‘Tailgating’ means following someone else through a door or gateway to enter premises without authorization.
‘Shoulder surfing’ means covertly observing someone type a PIN or password or other confidential data.
You discover that a threat actor has been able to harvest credentials from some visitors connecting to the company’s wireless network from the lobby. The visitors had connected to a network named ‘Internet’ and were presented with a web page requesting an email address and password to enable guest access. The company’s access point had been disconnected from the cabled network. What type of attack has been perpetrated?
Evil Twin Attack
Explanation: the threat actor uses social engineering techniques to persuade users to connect to an access point that spoofs a legitimate guest network service.
A threat actor recovers some documents via ‘dumpster diving’ and learns that the system policy causes passwords to be configured with a random mix of different characters that are only five characters in length. To what type of ‘password cracking’ attack is this vulnerable?
‘Brute force’ attacks
‘Brute force’ attacks are effective against short passwords.
‘Dictionary’ attacks depend on users choosing ordinary words or phrases in a password.
What type of cryptographic key is delivered in a digital certificate?
A ‘public key’.
A digital certificate is a wrapper for a subject’s public key. The public and private keys in an asymmetric cipher are paired. If one key is used to encrypt a message, only the other key can then decrypt it.
True or false? TKIP represents the best available wireless encryption and should be configured in place of AES if supported.
False
‘Advanced Encryption Standard’ (AES) provides stronger encryption and is enabled by selecting ‘Wi-Fi Protected Access’ (WPA) version 2 with AES/CCMP or WPA3 encryption mode. The ‘Temporal Key Integrity Protocol’ (TKIP) attempts to fix problems with the older RC4 cipher used by the first version of WPA. TKIP and WPA1 are now deprecated.
True or false? WPA3 personal mode is configured by selecting a passphrase shared between all users who are permitted to connect to the network.
True.
WPA3-Personal uses group authentication via a shared passphrase. The ‘Simultaneous Authentication of Equals’ (SAE) mechanism by which this passphrase is used to generate network encryption keys is improved compared to the older WPA2 protocol, however.
What two factors must a user present to authenticate to a wireless network secured using EAP-TLS?
The ‘private key’ and the ‘certificate’ + an ‘authentication’.
‘Extensible Authentication Protocol’ (EAP) allows for different types of mechanisms and credentials. The ‘Transport Layer Security’ (TLS) method uses digital certificates installed on both the server and the wireless station. The station must use its private key and its certificate to perform a handshake with the server; this is one factor; the user must authenticate to the device to allow use of this private key; this device authentication (via a password, PIN, or bio gesture) is the second factor.
In AAA architecture, what type of device might a RADIUS client be?
An ‘Access Point’.
AAA refers to ‘Authentication, Authorization, and Accounting’, and the ‘Remote Access Dial-in User Service’
(RADIUS) protocol is one way of implementing this architecture. The RADIUS server is positioned on the
internal network and processes authentication and authorization requests. The RADIUS client is the access point, and it must be configured with the IP address of the server plus a shared secret passphrase. The access point forwards authentication traffic between the end-user device (a supplicant) and the RADIUS server but cannot inspect the traffic.
You have selected a secure location for a new home router, changed the default password, and verified the WAN IP address and Internet link. What next step should you perform before configuring wireless settings?
To check for a firmware update.
Using the latest firmware is important to mitigate risks from software vulnerabilities.
You are reviewing a secure deployment checklist for home router wireless configuration. Following the CompTIA A+ objectives, what additional setting should be considered along with the following four settings?
- Changing the service set identifier (SSID)
- Disabling SSID broadcast
- Encryption settings
- Changing channels
To disable guest access.
It might be appropriate to allow a guest network depending on the circumstances, but the general principle is that services and access methods that are not required should be disabled.
You are assisting a user with setting up Internet access to a web server on a home network. You want to configure a DHCP reservation to set the web server’s IP address, allow external clients to connect to the secure port TCP/443, but configure the web server to listen on port TCP/8080. Is this configuration possible on a typical home router?
Yes.
You need to configure a port-mapping rule so that the router takes requests arriving at its WAN IP for TCP/443 and forwards them to the server’s IP address on TCP/8080. Using a known IP address for the server by configuring a ‘Dynamic Host Configuration Protocol’ (DHCP) reservation simplifies this configuration. The home router’s DHCP server must be configured with the ‘media access control’ (MAC) address or hardware identifier of the web server.
A different user wants to configure a multiplayer game server by using the DMZ feature of the router. Is this the best configuration option?
Probably not.
Using a home router’s ‘demilitarized zone’ or DMZ host option forwards traffic for all ports not covered by specific port forwarding rules to the host. It is possible to achieve a secure configuration with this option by blocking unauthorized ports and protecting the host using a personal firewall, but using specific port forwarding / mapping rules is better practice. The most secure solution is to isolate the game server in a screened subnet so that is separated from other LAN hosts, but this typically requires multiple router / firewalls.
You are assisting with the design of a new campus building for a multinational firm. On the recommendation of a security consultant, the architect has added closely spaced sculpted stone posts with reinforced steel cores that surround the area between the building entrance and the street. At the most recent client meeting, the building owner has queried the cost of these. Can you explain their purpose?
These bollards are designed to prevent vehicles from crashing into the building lobby as part of a terrorist or
criminal attack. The security consultant should only recommend the control if the risk of this type of attack
justifies the expense.
Katie works in a high-security government facility. When she comes to work in the morning, she places her hand on a scanning device installed at a turnstile in the building lobby. The scanner reads her palmprint and compares it to a master record of her palmprint in a database to verify her identity. What type of security control is this?
Biometric authentication.
Biometric authentication deployed as part of a building’s entry-control system.
The building will house a number of servers contained within a secure room and network racks. You have recommended that the provisioning requirement includes key operated chassis faceplates. What threats will this mitigate?
A lockable faceplate controls who can access the power button, external ports, and internal components. This mitigates the risk of someone gaining access to the server room via social engineering. It also mitigates risks from insider threat by rogue administrators, though to a lesser extent (each request for a chassis key would need to be approved and logged).
A user wants to secure their home Wi-Fi router. Which of the following are strong security practices? (Select all that apply).
A. Content filtering
B. Disable 2.4 GHz frequency band
C. Firmware update
D. AAA
A. Content filtering and C. Firmware update
Content filtering means that the firewall downloads curated reputation databases that associate IP address ranges, FQDNs, and URL web addresses with sites known to host various categories of content like malware, spam, or other threats.
Users should keep the firmware and driver for the home router up to date with the latest patches. This is important because it allows the user to fix security holes and support the latest security standards, such as WPA3.
Disabling the 2.4 GHz frequency will not increase security. 2.4 GHz is one of the frequencies used and has a better range with slower speeds.
An Authentication, Authorization, and Accounting (AAA) server is not typically set up on home networks.
A network administrator is setting up administrative access to network devices. What common solution is used for this?
A. Kerberos
B. TACACS+
C. RADIUS
D. EAP
B. TACACS+
TACACS+ is an AAA protocol like RADIUS, but it is typically used for device administration rather than user access to the network.
Active Directory itself is not an Authentication, Authorization, and Accounting (AAA) server. However, Kerberos can compare against the Active Directory database to validate if a user is able to log on.
Where Remote Authentication Dial-in User Service (RADIUS) is often used to authenticate connections by wireless and VPN users, TACACS+ is often used in authenticating administrative access to routers, switches, and access points.
Extensible Authentication Protocol (EAP) allows the use of different mechanisms to authenticate against a network directory.
A network administrator analyzes the physical placement of routers or network appliances to ensure a secure location. What non-malicious threat is the administrator helping to prevent?
A. Default password
B. Power off
C. Firmware update
D. Evil twin
B. Power off
A non-malicious threat actor could damage or power off an appliance by accident. A malicious threat actor could use physical access to tamper with an appliance or attach unauthorized devices to network or USB ports or use the factory reset mechanism and log on with the default password.
The home router management software will prompt users to change the default password to secure the administrator account.
Users should keep the firmware and driver for the home router up to date with the latest patches.
An evil twin attack is similar to phishing but instead of an email, the attacker uses a rogue wireless access point to try to harvest credentials.
An IT manager wants to secure a storage room with expensive server equipment. Which of the following will provide the best contactless security?
A. Badge reader
B. Electronic lock
C. Conventional lock
D. Bollard
A. Badge reader
A badge reader offers the most security. Some types of electronic locks work with a hardware token rather than a PIN. The token might be a basic magnetic swipe card. A more advanced type of lock works with a cryptographic contactless smart card or key fob.
An electronic lock, rather than using a key, is a lock operated by entering a PIN on an electronic keypad.
A conventional lock prevents the door handle from being operated without the use of a key.
Sites, where there is a risk of a terrorist attack, will use barricades such as bollards and security posts to prevent vehicles from crashing into the building or exploding a bomb near it.
A network administrator sets up a network access control solution throughout the enterprise which allows them to see ports with multiple devices connected into a switch port. The administrator uses this to help identify wireless access points throughout the enterprise, especially older ones which may have been forgotten. Which of the following legacy wireless encryption mechanisms is the administrator going to change? (Select all that apply.)
A. WPA2
B. WPA
C. WPA3
D. WEP
B. WPA and C. WEP
The first version of Wi-Fi Protected Access (WPA) was designed to fix critical vulnerabilities in the earlier ‘wired equivalent privacy’ (WEP) standard.
Wired Equivalent Privacy (WEP) is an old legacy standard. Neither WEP nor the original WPA version is considered secure enough for continued use.
WPA2 uses the Advanced Encryption Standard (AES) cipher deployed within the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP).
The main features of WPA3 are Simultaneous Authentication of Equals (SAE), updated cryptographic protocols, protected management frames, and Wi-Fi enhanced open.
A security company was asked to help set up physical security at a massive company to identify concealed weapons coming into the building. What should the company implement?
A. Access control vestibule
B. Magnetometer
C. Bollard
D. Fencing
C. Magnetometer
A handheld magnetometer is a type of metal detector that is often deployed at airports and in public buildings to identify concealed weapons or other items.
An access control vestibule is where one gateway leads to an enclosed space protected by another barrier. This restricts access to one person at a time.
Sites, where there is a risk of a terrorist attack, will use barricades such as bollards and security posts to prevent vehicles from crashing into the building or exploding a bomb near it.
Fencing is generally effective, but the drawback is that it gives a building an intimidating appearance.