Module 11 Flashcards

1
Q

____ is a cyberattack that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor, as shown in the figure.

____ describes the moment when a previously unknown threat is identified.

____ depicted as a red skull and crossbones trying to enter a LAN through a firewall

A

A zero-day attack, sometimes referred to as a zero-day threat,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ were implemented to passively monitor the traffic on a network.

A

Intrusion Detection Systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Working offline, the IDS compares the captured traffic stream with known malicious signatures, similar to software that checks for viruses. Working offline means several things:

A

The IDS works passively.

The IDS device is physically positioned in the network so that traffic must be mirrored in order to reach it.

Network traffic does not pass through the IDS unless it is mirrored.

Very little latency is added to network traffic flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Although the traffic is monitored, logged, and perhaps reported, no action is taken on packets by the IDS. This offline IDS implementation is referred to as ____

A

promiscuous mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ___ of operating with a copy of the traffic is that the IDS does not negatively affect the packet flow of the forwarded traffic.

A

advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ____ of operating on a copy of the traffic is that the IDS cannot stop malicious single-packet attacks from reaching the target. An IDS often requires assistance from other networking devices, such as routers and firewalls, to respond to an attack.

A

disadvantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a device that can immediately detect and stop an attack

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Common Characteristics of IDS and IPS

Malicious traffic is sent to the target host that is inside the network.

The traffic is routed into the network and received by an IPS-enabled sensor where it is blocked.

The IPS-enabled sensor sends logging information regarding the traffic to the network security management console.

The IPS-enabled sensor kills the traffic. (It is sent to the “Bit Bucket.”)

A

Both technologies are deployed as sensors.

Both technologies use signatures to detect patterns of misuse in network traffic.

Both can detect atomic patterns (single-packet) or composite patterns (multi-packet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IDS and IPS technologies are both deployed as sensors. An IDS or IPS sensor can be in the form of several different devices:

A

A router configured with IPS software

A device specifically designed to provide dedicated IDS or IPS services

A hardware module installed in an adaptive security appliance (ASA), switch, or router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IDS and IPS technologies use ___ to detect patterns in network traffic.

A ___ is a set of rules that an IDS or IPS uses to detect malicious activity. ___ can be used to detect severe breaches of security, to detect common network attacks, and to gather information.

A

signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDS and IPS technologies can detect

A

atomic signature patterns (single-packet) or composite signature patterns (multi-packet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IDS Advantages

A

No impact on network (latency, jitter)

No network impact if there is a sensor failure

No network impact if there is sensor overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IDS Disadvantages

A

Response action cannot stop trigger packets

Correct tuning required for response actions

More vulnerable to network security evasion techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPS Advantages

A

Stops trigger packets

Can use stream normalization techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IDS Disadvantages

A

Sensor issues might affect network traffic

Sensor overloading impacts the network

Some impact on network (latency, jitter)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDS Advantages

An IDS is deployed in offline mode and therefore:

A

The IDS does not impact network performance. Specifically, it does not introduce latency, jitter, or other traffic flow issues.

The IDS does not affect network functionality if the sensor fails. It only affects the ability of the IDS to analyze the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IDS Disadvantages

Disadvantages of an IDS include:

A

An IDS sensor cannot stop the packets that have triggered an alert and are less helpful in detecting email viruses and automated attacks, such as worms.

Tuning IDS sensors to achieve expected levels of intrusion detection can be very time-consuming.
Users deploying IDS sensor response actions must have a well-designed security policy and a good operational understanding of their IDS deployments.

An IDS implementation is more vulnerable to network security evasion techniques because it is not inline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IPS Advantages

Advantages of an IPS include:

A

An IPS sensor can be configured to drop the trigger packets, the packets associated with a connection, or packets from a source IP address.

Because IPS sensors are inline, they can use stream normalization. Stream normalization is a technique used to reconstruct the data stream when the attack occurs over multiple data segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IPS Disadvantages

Disadvantages of an IPS include:

A

Because it is deployed inline, errors, failure, and overwhelming the IPS sensor with too much traffic can have a negative effect on network performance.

An IPS sensor can affect network performance by introducing latency and jitter.

An IPS sensor must be appropriately sized and implemented so that time-sensitive applications, such as VoIP, are not adversely affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Deployment Considerations

A

You can deploy both an IPS and an IDS. Using one of these technologies does not negate the use of the other. In fact, IDS and IPS technologies can complement each other.

For example, an IDS can be implemented to validate IPS operation because the IDS can be configured for deeper packet inspection offline. This allows the IPS to focus on fewer but more critical traffic patterns inline.

Deciding which implementation to use is based on the security goals of the organization as stated in their network security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

More vulnerable to network security evasion techniques enabled by various network attack methods

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Can affect network performance by introducing latency and jitter

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Must be implemented so that time-sensitive applications are not adversely affected

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cannot stop the trigger packet and is not guaranteed to stop a connection

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Deployed in offline mode

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Can use stream normalization techniques to reduce or eliminate many of the network security evasion capabilities that exist

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Can be configured to perform a packet drop to stop the trigger packet

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Primarily focused on identifying possible incidents, logging information about the incidents, and
reporting the incidents

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Must be deployed inline, and traffic must be able to pass through it

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Less helpful in stopping email viruses and automated attacks, such as worms

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

There are two primary kinds of IPS available:

A

host-based IPS and network-based IPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

____ is software installed on a host to monitor and analyze suspicious activity.

A

Host-based IPS (HIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Advantages of Host-based IPS (HIPS)

A

Provides protection specific to a host operating system

Provides operating system and application level protection

Protects the host after the message is decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Disadvantages of Host-based IPS (HIPS)

A

Operating system dependent

Must be installed on all hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A _____ can be implemented using a dedicated or non-dedicated IPS device such as a router. ___ implementations are a critical component of intrusion prevention.

A

network-based IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Network-based IPS Sensors can be implemented in several ways:

A

On a Cisco Firepower appliance

On an ASA firewall device

On an ISR router

As a virtual Next-Generation IPS (NGIPSv) for VMware

37
Q

An example of a network-based IPS is the ____ . It is tuned for intrusion prevention analysis. The underlying operating system of the platform is stripped of unnecessary network services, and essential services are secured. This is known as____

A

Cisco Firepower NGIPS

hardening.

38
Q

The hardware of all network-based sensors includes three components:

A

NIC - The network-based IPS must be able to connect to any network, such as Ethernet, Fast Ethernet, and Gigabit Ethernet.

Processor - Intrusion prevention requires CPU power to perform intrusion detection analysis and pattern matching.

Memory - Intrusion detection analysis is memory-intensive. Memory directly affects the ability of a network-based IPS to efficiently and accurately detect an attack.

39
Q

Modes of Deployment

IDS and IPS sensors can operate in

A

inline mode (also known as inline interface pair mode) or promiscuous mode (also known as passive mode).

40
Q

True or False? A HIPS can be configured in either promiscuous or inline mode.

A

False. A host-based IPS is installed on a host computer. Only network-based IPS can be run in promiscuous or inline mode.

41
Q

What is true of a NIPS that is running in inline mode?

A

An inline NIPS can add latency to the network because traffic must be processed before being forwarded to its destination

42
Q
A
43
Q

What is true of a HIPS?

A

HIPS software combines anti-virus, anti-malware, and firewall functionality.

44
Q

What is an example of a HIPS?

A

Windows Defender is an example of a HIPS that is included with Microsoft Windows.

45
Q

An IPS sensor has two components:

A

IPS detection and enforcement engine -

To validate traffic, the detection engine compares incoming traffic with known attack signatures that are included in the IPS attack signature package.

IPS attack signatures package -

This is a list of known attack signatures that are contained in one file. The signature pack is updated frequently as new attacks are discovered. Network traffic is analyzed for matches to these signatures.

46
Q

the IPS detection and enforcement engine that can be implemented depends on the router platform:

A

Cisco IOS Intrusion Prevention System (IPS) -

This is available on older Cisco 800, 1900, 2900, and 3900 Series ISRs. IOS IPS is no longer supported and should not be used.

Cisco Snort IPS -

This is available on the Cisco 4000 Series ISRs and Cisco Cloud Services Routers in the 1000v Series.

47
Q

When Cisco IOS IPS detected suspicious activity, it responded before network security could be compromised. It logged the event as _____

A

Cisco IOS syslog messages or through Security Device Event Exchange (SDEE).

48
Q

when packets in a session matched a signature, Cisco IOS IPS could be configured to respond as follows:

A

Send an alarm to a syslog server or a centralized management interface

Drop the packet

Reset the connection

Deny traffic from the source IP address of the threat for a specified amount of time

Deny traffic on the connection for which the signature was seen for a specified amount of time

49
Q

___ is available on Cisco ISR 4000 devices.

A

Snort IPS

50
Q

The Snort engine runs as a ____ on Cisco 4000 Series ISRs.

A

virtual service container

51
Q

In ___, Snort inspects traffic and reports alerts, but does not take any action to prevent attacks.

A

IDS mode,

52
Q

Snort IPS is available on which router platform?

A

Cisco 4000

53
Q

Where does the Snort engine run?

A

service container

54
Q

In which operating mode does Snort IDS inspect traffic and report alerts, but does not take any action to prevent attacks?

A

IDS mode

55
Q

Snort can be enabled in either of the following modes:

A

IDS mode -

Snort inspects the traffic and reports alerts, but does not take any action to prevent attacks.

IPS mode -

In addition to intrusion detection, actions are taken to prevent attacks.

56
Q

In the network intrusion detection and prevention mode, Snort performs the following actions:

A

Monitors network traffic and analyzes against a defined rule set.

Performs attack classification.

Invokes actions against matched rules.

57
Q

Feature of Snort

Signature-based intrusion detection system (IDS) and intrusion prevention system (IPS)

A

Benefit

Snort open-source IPS, capable of performing real-time traffic analysis and packet logging on IP networks, runs on the 4000 Series ISR service container without the need to deploy an additional device at the branch.

58
Q

Feature of Snort

Snort rule set updates

A

Snort rule set updates for 4000 Series ISRs are generated by Cisco Talos, a group of leading-edge network security experts who work around the clock to proactively discover, assess, and respond to the latest trends in hacking activities, intrusion attempts, malware, and vulnerabilities.

59
Q

Feature of Snort

Snort rule set pull

A

The router will be able to download rule sets directly from cisco.com or snort.org to a local server, using one-time commands or periodic automated updates.

60
Q

Feature of Snort

Snort rule set push

A

A centralized management tool can push the rule sets based on preconfigured policy, instead of the router directly downloading on its own.

61
Q

Feature of Snort

Signature allowed listing

A

Allowed listing allows the disabling of certain signatures from the rule set. Disabled signatures can be reenabled at any time.

62
Q

To run the service container infrastructure with IDS/IPS functionality, Snort IPS requires

A

an ISR 4000 (i.e., 4300 or higher) with a minimum of 8 GB of memory (DRAM) and 8 GB of flash.

63
Q

____ is required to activate Snort IPS functionality.

A

A security K9 license (SEC)

64
Q

There are two types of term-based subscriptions:

A

Community Rule Set -
This set offers limited coverage against threats, focusing on reactive response to security threats versus proactive research work. There is 30-day delayed access to updated signatures in the Community Rule Set, and this subscription does not entitle the customer to Cisco support.

Subscriber Rule Set -
This set offers the best protection against threats. It includes coverage in advance of exploits by using the research work of the Cisco Talos security experts. The Subscriber Rule Set also provides the fastest access to updated signatures in response to a security incident or the proactive discovery of a new threat. This subscription is fully supported by Cisco.

65
Q

____ is a rule management application that can be used to automatically download Snort rule updates. In order to use PulledPork, you must obtain an authorization code, called an ____ from your snort.org account. The ___ is free with registration.

A

PulledPork

oinkcode,

66
Q

To determine normal network behavior, network monitoring must be implemented. Various tools are used to help discover normal network behavior including ___

A

IDS, packet analyzers, SNMP, NetFlow, and others.

Some of these tools require captured network data.

67
Q

here are two common methods used to capture traffic and send it to network monitoring devices:

A

Network taps, sometimes known as test access points (TAPs)

Traffic mirroring using Switch Port Analyzer (SPAN) or other port mirroring approaches

68
Q

A ____ is typically a passive splitting device implemented inline between a device of interest and the network.

A

network tap

69
Q

A ____ forwards all traffic, including physical layer errors, to an analysis device while also allowing the traffic to reach its intended destination.

A

tap

70
Q

are also typically fail-safe, which means if a ___ fails or loses power, traffic between the firewall and internal router is not affected.

A

Taps

71
Q

SPAN Term

Ingress traffic

Egress traffic

A

Traffic that enters the switch.

72
Q

SPAN Term

Egress traffic

A

Traffic that leaves the switch.

73
Q

SPAN Term

Source (SPAN) port

A

Source ports are monitored as traffic entering them is replicated (mirrored) to the destination ports.

74
Q

SPAN Term

Destination (SPAN) port

A

A port that mirrors source ports. Destination SPAN ports often connect to analysis devices such as a packet analyzer or an IDS.

75
Q

A session number is used to identify a SPAN session.

show the ____ command, which is used to associate a source port and a destination port with a SPAN session.

A separate ____ command is used for each session. A VLAN can be specified instead of a physical port.

A

Switch(config)# monitor session number source [interface interface | vlan vlan]

Switch(config)# monitor session number destination [interface interface | vlan vlan]

__monitor session

S1(config)# monitor session 1 source interface fastethernet 0/1

S1(config)# monitor session 1 destination interface fastethernet 0/2

76
Q

Type : Local Session
Source Ports :
Both : Fa0/1
Destination Ports : Fa0/2
Encapsulation : Native
Ingress : Disabled

A

S1# show monitor

77
Q

What is an IPS signature?

A

Topic 11.1.0 - An IPS signature uniquely identifies specific malware, protocol anomalies, or malicious traffic. IPS sensors are tuned to look for matching signatures or abnormal traffic patterns. IPS signatures are conceptually similar to the virus.dat file used by virus scanners.

It is a set of rules used to detect typical intrusive activity

78
Q

Which network technology uses a passive splitting device that forwards all traffic, including Layer 1 errors, to an analysis device?

A

Topic 11.4.0 - A network tap is a common technology that is used to capture traffic for monitoring the network. The tap is typically a passive splitting device implemented inline on the network and that forwards all traffic, including physical layer errors, to an analysis device.

Network Tap

79
Q

What is a characteristic of an IPS operating in inline-mode?

A

Topic 11.2.0 - An IPS in inline-mode is directly in the traffic flow and adds latency. Inline-mode allows the sensor to stop attacks by dropping malicious traffic before it reaches the intended target, thus providing a protective service.

It can stop malicious traffic from reaching the intended target

80
Q

What is a zero-day attack?

A

Topic 11.1.0 - A zero-day attack is an attack on a system that uses vulnerabilities that have not yet been reported to, and mitigated by, the vendor.

It is a computer attack that exploits unreported software vulnerabilities

81
Q

What is a feature of an IPS?

A

Topic 11.1.0 - An advantage of an intrusion prevention systems (IPS) is that it can identify and stop malicious packets. However, because an IPS is deployed inline, it can add latency to the network.

It can stop malicious packets

82
Q

Which network monitoring technology passively monitors network traffic to detect attacks?

A

Topic 11.1.0 - Intrusion Detection Systems (IDSs) are network devices that passively monitor the traffic on a network.

IDS

83
Q

Which open source network monitoring technology performs real-time traffic analysis and generates alerts when threats are detected on IP networks?

A

Topic 11.3.0 - Snort is an open source network IPS that performs real-time traffic analysis and generates alerts when threats are detected on IP networks. The legacy Cisco IOS IPS allowed a Cisco ISR router to be enabled as an IPS sensor to scan packets and sessions to match any of the Cisco IOS IPS signatures. Port mirroring allows a switch to copy frames that are received on one or more ports to a Switch Port Analyzer (SPAN) that is connected to an analysis device. Remote SPAN (RSPAN) is a variation of SPAN that enables a network administrator to use the flexibility of VLANs to monitor traffic on remote switches.

Snort IPS

84
Q

Which Cisco platform supports Cisco Snort IPS?

A

Topic 11.3.0 - The newer ISR routers, Cisco 4000 series, no longer support IOS IPS. The 4000 series routers provide IPS services using Snort.

4000 Series ISR

85
Q

Which device supports the use of SPAN to enable monitoring of malicious activity?

A

Topic 11.4.0 - SPAN is a Cisco technology that allows all of the traffic from one port to be redirected to another port.

Cisco Catalyst Switch

86
Q

What is a host-based intrusion detection system (HIDS)?

A

Topic 11.2.0 - A current HIDS is a comprehensive security application that combines the functionalities of antimalware applications with firewall protection. An HIDS not only detects malware but also prevents it from executing. Because the HIDS runs directly on the host, it is considered an agent-based system.

It combines the functionalities of antimalware applications with firewall protection

87
Q

Which network monitoring capability is provided by using SPAN?

A

Topic 11.4.0 - When enabled on a switch, SPAN or port mirroring, copies frames that are sent and received by the switch and forwards them to another port, known as a Switch Port Analyzer port, which has a analysis device attached.

Traffic exiting and entering a switch is copied to a networking monitoring device

88
Q

What network monitoring tool can be used to copy packets moving through one port, and send those copies to another port for analysis?

A

Topic 11.4.0 - The Cisco Switched Port Analyzer (SPAN) feature allows traffic that is coming into or out of a port to be copied to a different port so that it can be collected and analyzed.

SPAN