Module 19 - Technologies and protocols Flashcards

(33 cards)

1
Q

Which logging standard allows devices from various vendors to send event messages to a centralized log server?

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of attack might target syslog servers to conceal data exfiltration or tamper with detection logs?

A

Blocking log transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which port must be open on a syslog server to receive log messages from clients?

A

UDP port 514

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which syslog implementation enhances security against exploits targeting traditional syslog?

A

syslog-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which protocol ensures synchronized timestamps across network devices to support accurate event correlation?

A

NTP (Network Time Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which port does NTP use to synchronize time across network devices?

A

UDP port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which technique allows attackers to hide data in DNS queries to evade security measures?

A

DNS data Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which encoded formats are commonly used in malicious DNS subdomains to mask stolen data? (3)

A

Base64, Hex and 8-bit binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which DNS request behavior may indicate the presence of hidden exfiltration activities?

A

Long, random looking subdomains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of DNS service can detect and block communications to known CnC or exploit domains?

A

Cisco Umbrella

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which web protocol transmits all data in plaintext, making it vulnerable to interception and alteration?

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which log source can analysts examine to detect anomalies in DNS request lengths and subdomain patterns?

A

DNS proxy logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which method allows security appliances to inspect encrypted HTTPS traffic for threats?

A

SSL decryption and inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which common attack involves inserting hidden malicious content in a webpage that redirects browsers to malware?

A

iFrame injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which protocol protects HTTP traffic during transmission by encrypting it with SSL/TLS?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which email protocol is used to send data between mail servers and can be exploited for data exfiltration?

12
Q

Which email protocols are commonly used to download messages from a server and may deliver malware attachments?

A

POP3 and IMAP

13
Q

Which protocol is used for diagnostic and control messages but can be exploited for mapping, DoS, or tunneling?

14
Q

Which exploit method uses crafted ICMP packets to covertly transfer data from a compromised system?

A

ICMP tunneling

15
Q

Which network control mechanism filters traffic based on IPs, protocols, and ports but can create a false sense of security if overly relied upon?

16
Q

What are some ways attackers can bypass ACLs by manipulating protocol traffic?

A

By spoofing IP address

17
Q

Which popular P2P application uses distributed ledger sharing and is commonly associated with cryptocurrency transactions?

18
Q

Which security solutions can address limitations of static ACL-based filtering by using behavior and context-based analysis?

A

Cisco AMP (advanced malware protection)

19
Q

Which version of NAT allows many internal devices to share one public IP by assigning unique source port numbers?

A

PAT (Port address translation)

20
Which technology hides internal IP addresses from external visibility by translating them to public-facing addresses?
NAT (Network address translation)
21
Which networking model allows hosts to act as both client and server, and includes file sharing, processor sharing, and instant messaging?
P2P (Peer to peer) networkinng
22
Which messaging service type is classified under P2P and can pose risks unless specialized secure applications are used?
IM (Instant messaging)
23
Which form of P2P networking distributes computational tasks, often for scientific research or charitable purposes?
P2P processor sharing
24
Which anonymizing network uses layered encryption (onion routing) to conceal the source and destination of internet traffic?
Tor
25
Which feature of Tor ensures that no single router knows the full traffic route, enhancing anonymity?
Layered encryption
26
Which network process distributes traffic between devices or paths to prevent overwhelming a single resource?
Load balancing
27
Which domain-based technique allows load balancing by associating a single domain name with multiple IP addresses?
DNS based Load balancing
28
Which component sends probes to test server health and path performance to ensure traffic isn't routed to unavailable resources?
LBM (Load balancing manager)