Prof Commentary Flashcards

(34 cards)

1
Q

how many types of vulnerability assessment scanners are there?

A

2 network scanners and web application scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what do network scanners do

A

probe a network for a variety of widely known vulnerabilities. like finding open network ports. (zenmap or nmap)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what do web application scanners do

A

scan hosted web applications for known vulnerabilities. Since they are public facing they cannot be locked down as easily as an internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

zenmap

A

shows number of ports, number and identity of open ports, and common usage of the ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

topology report does what

A

Helps you to visualize your connection to the network. shows local connection(your computer) and following connections like to a home network, to a server, to a DNS server, to a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

nessus

A

commercial security scanner. widely used tool. useful for large networks. reports includes open ports, open on which hosts, and any security threats to those ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

retina

A

proprietary vulnerability scanner. deep-scan looking for known issues not patched in existing applications. report contains open ports, vulnerabilities, and state of environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

saint

A

(system administrator’s integrated network tool) commercial vulnerability assessment tool. unix based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

network analysis or network forensics analysis

A

analysis of network data to reconstruct network activity over a specific period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

network analysis able to reveal

A

vulnerabilities
probing
DoS attacks
user-to-root attacks
remote-to-local attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is probing

A

scanning to find known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is DoS

A

overwhelming the system with requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are user-to-root attacks

A

gains access to an ordinary user attack and exploits it to gain administrative privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are remote-to-local attacks

A

has no user account but gains access to a network by exploiting a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

packet capture tools

A

allow you to capture packets and analyze it in detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

intrusion detection systems

A

monitor internal hosts or networks for suspicious traffic and alert administrators at its occurrence.

17
Q

data collector

A

appliance or software that records data on each network connection passing through the device monitoring appliance or software. can detect specific data, such as packets going to or from a specific system. typically not feasible to keep captured data for an extended period of time.

18
Q

Main area for traffic collection is

A

inbound and outbound traffic at a DMZ or just inside the firewall.

19
Q

network analysis steps

A

create a baseline (nmap)

capture data at specific points on the network

analyze captured data, compare to baseline review logs (data should not overwhelm analysis process so be as specific as possible during capture phase)

use results of analysis (EX. remove unnecessary services or closing open ports that represent a vulnerability.)

20
Q

types of data loss/data leak prevention tools

A

2 types, parameter based tools or client/end point based tools (some tools combine these two types of tools)

21
Q

purpose of data loss/data leak prevention tools

A

detect(can scan emails for large file sizes, account numbers, social security numbers) and block sensitive data from leaving a network. enforce policies across emails, file shares, databases, and stored data to prevent data leak.

22
Q

stops leaks before it leaves the lan or wan network.

A

perimeter based data loss prevention tools

GTB inspector
palisade packetsure
fidelis XPS
Code Green Content Inspector
Microsoft information security suite?

23
Q

stops leak before it leaves the client device

A

client based data loss prevention tools (not worth operating in soho networks)

Sophos Endpoint Security
Data Protection Software suite
RSA SLP Endpoint

24
Q

main role of boundary router

A

protects internal network against IP address spoofing and directed IP broadcasts and passes traffic to firewall

25
ingress
inbound traffic
26
egress
outbound traffic
27
ingress filtering
rejects data with an internal host address and drops non routable IP addresses (private IP addresses)
28
egress filtering
stops packets from leaving a network that have non-company MAC/IP addresses as their source
29
Monitors internal network or hosts (some can prevent data loss but that is not their primary function)
IDS/IPS
30
monitors inbound/outbound packets
firewall and router
31
detects and acts/alerts when attack occurs (reactive defense)
IDS
32
prevents attack before it is successful (proactive defense)
IPS
33
detects and alerts malicious patterns in the network traffic
network-based IDS/IPS
34
detects and alerts malicious signatures in log files
host-based IDS/IPS