Security Architecture Domains 1 and 2 Flashcards

1
Q

Access control is a way to discover

A

Who is accessing the information? (the Subject doing the accessing)
What is being accessed? (the Objects) being accessed)
How might the access occur? (the mechanism(s) used for access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the major concepts of access control

A

Subject, Object, Permissions, Rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a permission and a right

A

Through their rights (policy) users are granted permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the interaction between subjects, rights, permissions and objects

A

Subjects - WHO
Rights - HOW
Permissions - HOW
Objects - WHAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access control coupled with __________ establishes the basis for accountability

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Auditing is

A

The process of recording access control actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system should be governed by a written standard that specifies the rules applicable to the system. These rules are derived from

A
  • Laws
  • Regulations
  • Industry standards
  • Organisational policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The compilation of rules applicable to a particular IT system forms the

A

security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The security policy addresses

A

managerial, operational, and technical security requirements for a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

More often than not ______________________ in an IT system represents the bulk of the technical security within the security policy. The interpretation of the correct

A

access control and auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access control at the network level tends to be more (1) such as allowing or disallowing access to (2)

A

connection oriented
ports and protocols associated with given IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Each subject identified in an ACL is known as an

A

Access control entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The _____________ is used to manage each ACL in the system

A

ACL repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____________ is the predominant access control technique in use today. Most commodity systems implement some form of it in some form.

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The underlying concept of DAC is

A

to give an object owner the discretion to decide who is authorised access to an object and to what extent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why does the read permission not always mean read only

A

In the case of files it normally also means read and copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is important to remember about the write permission

A

It can also mean to delete, because a file can be overwritten with a single byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Given the Read, Write and Execute problems that attend DAC systems what are some implementation strategies that mitigate them

A
  1. Limit access to essential objects only.
  2. Label sensitive data.
  3. Filter information where possible.
  4. Promulgate guidance that prohibits unauthorised duplication of
    information.
    5 Conduct monitoring for noncompliance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

__________________________ is the primary means of controlling system integrity. Why do viruses often gain complete access to a system?

A

Preventing unauthorized modification of resources is the primary
means of controlling system integrity. Why do viruses often gain complete
access to a system? Excessive permissions on configuration settings and files allow the virus to write to or delete critical files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Access control mechanisms that are neither DAC nor mandatory access control (MAC) are referred to as forms of

A

nondiscretionary access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Types of non-discretionary access control

A
  1. Role-Based Access Control (RBAC)
  2. Originator Controlled (ORCON)
  3. Digital Rights Management (DRM)
  4. Usage Controlled (UCON)
  5. Rule-Based Access Control -
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MAC functions by associating 1. level with the 2. level of the target object. It is important to note that systems supporting

A
  1. A subject’s clearance level with
  2. The sensitivity level of the target object.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are common reasons why users receive rights and permissions that go beyond what is needed for the task?

A
  • Lack of explicit definition of duties - Neither the user nor manager
    has a clear grasp or definition of the duties assigned to the
    individual.
  • Weak internal controls - Where explicit duties are known, changes
    in duties or access controls on the system may not be periodically
    reviewed for conflicts.
  • Complexities in administration - In very large, distributed
    organizations, it is difficult to know the access limitations that
    should be imposed when access control is centralized.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Security design efforts should consider various aspects that could affect
separation of duties. At a minimum, it should be possible to enforce separation of duties through the user access control mechanisms whether the designation is manual or automated. A system should have sufficient administrative flexibility to accommodate the following aspects:

A
  • Identify each explicit role
  • Assign appropriate permissions
  • Avoid unnecessary rights
  • mitigate workflow violation potential
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What techniques can be used in small organisations to help with the problem of separation of duties?
Assign accounts on a per-role basis - An individual should have a separate account for each role used. Prevent those with multiple roles from reading and writing to the same storage area Auditing is vital - Consider implementing object-level auditing for individuals with multiple roles. Conduct more frequent evaluations
26
All of the technical security controls in a system are collectively referred to as
the Trusted Computing Base (TCB).
27
The overall security of a system is no stronger than
the most vulnerable components of the TCB
28
What are the most common components of the TCB of most enterprise systems.
Port Locking and Network Access Control (switches) User management and resource control (Workstations and Servers) Network Filtering and Access Control (Routers) Business data access rules (Databases) Boundary protections (firewalls) Information Flow Control (Application servers)
29
A _________________ is the collection of components of a TCB that mediate all access within a system.
Security Kernel
30
The most common functions of the security kernel include
Authentication, auditing, and access control.
31
The operational aspect of the security functions is referred to as
The security reference monitor
32
What does a security reference monitor generally do
Compares an access request against a listing that describes the allowed actions
33
What does the acronym AAA refer to
Authentication, Authorisation and Accounting
34
An access control system that is centralised relies on a
A single device as the security reference monitor. Authorisation and access control decisions are made from the centralised device
35
What are the approaches to achieving centralised access control
1. The ACS proxies client requests - limits communication 2. A gatekeeper mechanism - limits communication 3. Free roaming on the network with control over individual access requests.
36
What are the disadvantages of ACS
Single point of failure Single point of compromise Capacity
37
A number of protocols exist that support centralized access control.
TACACS, TACACS+, RADIUS, and EAP are just a few of the most common access
38
TACACS
An older centralised access control system. Terminal Access Control ACS. On port 49
39
A critical shortcoming in TACACS is
A critical shortcoming in TACACS is the lack of encryption. All communication from a TACACS client to the server is in cleartext. Using this protocol through an untrusted or public network exposes the session and endpoints to a potential compromise.
40
TACACS+
Protocol supporting centralised access control TACACS+ - This proprietary protocol by Cisco is based on TACACS. It is primarily used with TCP on port 49. This protocol overcomes the security weaknesses of its predecessor by providing encryption for the packet payload. Authentication, Authorization, and Accounting (AAA) capabilities are built into the protocol, whereas it is missing from TACACS.
41
Shortcoming of TACACS+
The use of AAA capabilities is implementation specific. Therefore, a security architect must ensure that each TACACS+ implementation is consistent with the policy of the organization.
42
RADIUS
Protocol supporting centralised access control The Remote Authentication Dial In Service (RADIUS) also has AAA capabilities built into the protocol. RADIUS is a centralized access control protocol commonly used in the telecommunications industry as well as by Internet service providers. A network access server (NAS) acting as the gateway to a network passes client access requests to the RADIUS server.
43
EAP
Protocol supporting centralised access control The Extensible Authentication Protocol (EAP) is a protocol supporting multiple authentication methods. It operates above the data link layer and therefore does not rely on IP. Essentially a peer-to-peer protocol. The protocol relies on the lower layer to ensure packet ordering, but retransmissions are the responsibility of EAP. Its design as an authentication protocol prohibits its use for data transport, which would be inefficient.
44
Protection of the device used for centralised access control is vital. List some the important counter measures
Reduce attack surface Active monitoring Device backup Redundancy
45
A collection of nodes that individually make access control decisions through a replicated database characterises a ...
decentralized access control mechanism. The
46
Although decentralized access control has advantages, it is not perfect. Some of the issues that need to be considered when implementing decentralized access control include
- Continuous synchronization considerations - The access control mechanism is only as current as the last synchronization. Excessive gaps in the time between synchronizations may allow inappropriate access to the system or objects. - Bandwidth usage - Synchronization events might consume a lot of bandwidth. Nodes joined through low-bandwidth connections may consume a disproportionate amount of bandwidth when synchronizing. - Physical and logical protection of each access control node - A compromise of one access control node could propagate a compromise to all. Successful attacks against the centralized database in one location could provide the attacker with the ability to attack any node participating in the architecture.
47
Inconsistencies in security countermeasures are a common issue with systems using decentraliSed access control. Servers providing access control services could be located in different facilities in the same region or in different parts of the world. Ensuring that the intended design is consistently applied for each instance can be quite challenging.
- Physical security - Management coordination - Remote maintenance (making it reachable to) - Exclusion from DMZ
48
Design Considerations There are a number of issues that must be carefully considered when implementing federated access control.
Cooperative effort Mutual risk Utilize a DMZ Exclude access control integration
49
The X.500 Directory Specification provides
A framework to specify the attributes used to create a directory as well as the methods used to access its objects
50
The IETF has defined an alternative method to access an X.500-based directory over IP that is known as
Lightweight Directory Access Protocol (LDAP).
51
The latest Microsoft servers rely extensively on their proprietary DAP implementation known as
Active Directory
52
Directory specifications such as X.500 enable an organization to publish information in a way that
Supports hierarchical access to structured information.
53
How is PKI vulnerable
Depends on the physical security of the device with the private key
54
Traditionally, there have been two distinct approaches to Security Management:
Security Event Management (SEM) and Security Information Management (SIM).
55
What are the six capabilities of a SIEM system
1. Data aggregation 2. Correlation 3. Alerting 4. Dashboards 5. Compliance 6. Retention
56
What does the correlation function of an SIEM refer to
The ability to use correlation techniques to integrate data from different sources.
57
A ________________ is the principal subject of interest within an access control mechanism.
A system user is the principal subject of interest within an access control mechanism.
58
Ideally, ________________ will be subject to an access control mechanism.
every object
59
What is the significant drawback of ODBC
SQL commands are sent in clear text
60
What do security architects often use to get around the security hazards of allowing direct connections to database
Three-tier Web-based applications are a frequently used architecture to provide controlled access to organizational data.
61
Three-tier Web-based applications are a frequently used architecture to provide controlled access to organizational data. Implementing this type of architecture has its benefits and drawbacks. Discuss the benefits
1. A web browser can be used instead of proprietary applications 2. Provides a method of allowing multiple users to get access to the sites 3. Communication channels can be encrypted
62
Three-tier Web-based applications are a frequently used architecture to provide controlled access to organizational data. Implementing this type of architecture has its benefits and drawbacks. Discuss the drawbacks
1. Increased complexity 2. Vulnerability to cross site scripting 3. Middle tier security (a breach of the server could result in a breach of the data)
63
Managing through the use of groups is indeed a double-edged sword. Although it provides substantial power to mitigate risk, when not properly managed it can cause other problems. Some issues facing a security architect when controls governing group management fail are the following:
Orphaned groups Duplicated groups Separation of duty violations Failures in least privilege
64
Administering group membership is an aspect of
Identity management
65
Groups and roles are both a type of collection, but differ in their application. Groups are collections of ______, while roles are collections of ___________.
Users Rights and permissions
66
An important aspect of an RBAC implementation is _________________, which is the fundamental attribute used to establish separation of duties.
mutual exclusivity
67
How can the implementation of RBAC differ from one vendor to another
the ability to specify mutual exclusivity.
68
A true implementation of RBAC is predicated on a mechanism that enforces its attributes. However, this may not be practical or feasible for resource-constrained organisations using commodity systems that desire this type of access control. In these cases what can one do
groups could be used to mimic role-based access.
69
When using groups to mimic role-based access what should one do on creation of the groups
A detailed listing of the attributes and uses of each group as a role is required.
70
When using groups to mimic role-based access one should Identify Which objects in the system should have
permissions associated with the roles
71
When using groups to mimic role-based access what should one avoid assigning to groups
groups
72
When using groups to mimic role-based access what should one avoid assigning on objects
Refrain from assigning account permissions on objects. .
73
When using groups to mimic role-based access should one allow users to have multiple accounts?
Yes, Issue users multiple accounts. This is necessary if varying levels of rights are needed. This does not mean a user must have an account for each role, but rather, the inclusion of a member in a "role" must not create a situation where an account can easily circumvent its intended use. In this regard, a solid identity management methodology increases in importance.
74
When using groups to mimic role-based access how could system services be used
could act as intermediaries between subjects and objects.
75
When using groups to mimic role-based access how should one audit and monitor the system
monitor for inappropriate permissions and audit for misuse
76
What are the attributes to consider in Task Based Access control TBAC
Time Sequence Dependencies
77
What is the standard for Task Based Access Control (TBAC)
The concept of TBAC is still an emerging topic. Presently, there are no accepted standards or definitions of what TBAC entails. However, this does not detract from the usefulness of implementing access control according to the attributes of a task in a workflow. Indeed, many organizations already implement types of access control in workflows. A number of document collaboration suites implement workflows and make use of TBAC enforcement attributes.
78
The routing access control list specifies
subnets or addresses that are accessible from a segment
79
Techniques to achieve location-based access control The routing access control list specifies subnets or addresses that are accessible from a segment. The critical point here is that
Different segments should be physically separated until they are connected to the node applying the logical access controls. This prevents an insider from spoofing an address in an alternate subnet and bypassing access controls based on physical location.
80
Techniques to achieve location-based access control The idea of using access controls for network segments assumes that requests for resource access originate from a node within the segment, when is this not the case
When the segment has been compromised by a bot or a trojan
81
Techniques to achieve location-based access control Enabling access controls according to device type is dependent on two important factors:
1. Device recognition - Each device type must be recognizable in some way by the access control mechanism. 2. Policy enforcement - Access control decisions are made according should not be allowed to connect and pass traffic in the network.
82
Techniques to achieve location-based access control What happens with network based access control using physical and logical addresses
The rules regarding what the device is allowed to communicate with would be encoded into Layer 2 devices, Layer 3 devices, and monitoring devices.
83
Techniques to achieve location-based access control What happens with network based access control using 802.1X standard
As devices connect to the network, they are authenticated according to the certificate presented. A RADIUS server is used to support device authentication.
84
Techniques to achieve location-based access control Advantages of network based access control
- Standards based - all connected devices can be authenticated - connection attempts can be logged
85
Techniques to achieve location-based access control Disadvantages of network based access control
- not supported by all device types - each device still needs a certificate - certificates need to be managed - limited to authentication
86
Techniques to achieve location-based access control potential advantages of third party access control systems
- specialised - supported - policy alignment can be determined - automated
87
Techniques to achieve location-based access control Potential disadvantages of third party access control systems
- cost - hype (imaginary functionality) - may not support all device types
88
The design and implementation of location-based access control involves the following factors (7)
* Join logical and physical - use the logical and physical attributes of nodes and networking equipment. * Layer controls - Use multiple techniques to achieve defence in depth. * Map and inventory the network * Conduct traffic pattern analysis - * Know where segments exist physically - * Implement rules on networking equipment * Monitor compliance
89
The necessary components of identity verification include
* Entity - A person or process claiming a particular identity. * Identity - A unique designator for a given subject. * Authentication factor - Proof of identity supplied by the entity. * Authenticator - The mechanism to compare the identity and factor against a database of authorised subjects. * Database - A listing of identities and associated authentication factors.
90
The Difference between an Entity and Subject
An individual who is yet to be authenticated is referred to as an entity rather than a subject. This distinction is necessary because a subject represents someone or something with logical rights and permissions in a system. An entity has no logical rights before authentication. An entity graduates to a subject when successfully validated.
91
An authentication factor meeting at least one of these qualities will provide sufficient confidence that an attacker will not be able to easily masquerade as the intended subject.
1. It is known only to the entity 2. Reproduction of it is infeasible 3. It is computationally impractical to replicate
92
List some token based authentication tools
Badges Magnetic strips Proximity cards
93
Can proximity cards be spoofed
Most cards are not capable of using encryption to prevent spoofing. Rogue readers with high output fields and strong sensitivity can be used to capture card identities as people pass by. This information can be passed to specially constructed devices that retransmit card information, allowing access to protected areas.
94
Biometrics can be broadly categorised as
either physical or behavioural.
95
Give an example of a behavioural biometric
The way each person uses a keyboard represents a biometric referred to as typing dynamics or keystroke dynamics.
96
When comparing various biometric options, it is important to consider the following key operational aspects
Accuracy Enrolment time Response time Security
97
When comparing various biometric options, it is also important to consider the implementation aspects
Cost Acceptance Storage Changes
98
Iris-based technologies have proved themselves to be one of the best forms of biometrics (Chirillo and Blaul, 2003). They have very low error rates and are very accurate. These types of biometric devices have a moderate-to-low cost. It is likely that cost will continue to decrease as usage increases globally. Although these devices have good performance, there are issues.
1. Users are still somewhat reluctant to participate in iris-based biometrics. It seems that people fear that the acquisition device could damage their eyes due to the use of infrared technology. 2. Eye movement, proximity, and angle of the acquisition device, as well as lighting, affect the quality of the minutiae collected. These variations can hinder the enrollment process.
99
Retina recognition systems are very accurate and very expensive. Spoofing a retina pattern is considered difficult. Aside from cost, the biggest drawback to retina-based biometrics is
User acceptance. Enrolment and authentication with a retina recognition device requires an individual to place the eye very close to the input device. Many users fear damage to their eye by the device or contracting an eye disease from a prior user. Eye glasses and contacts also interfere with the proper operation of a retina detection device. Due to cost and acceptance considerations, retina-based biometrics should only be used when a high level of security is essential.
100
Facial recognition technologies have acceptable performance, are low cost, and are not generally resisted by users. However, they do have some issues.
Lighting, hairstyles, subject aging, cosmetics, accessories such as glasses or piercing, expressions, and facial hair can affect the accuracy of the detection process. Furthermore, some facial recognition techniques can be fooled with an image of the actual subject presented to the input device. Some facial recognition techniques also fail to distinguish between identical twins.
101
There is an important attribute of authentication factors that is sometimes overlooked. The strength attribute of an authentication factor lies in its ability to resist abuse; that is, a strong authentication factor is difficult to reproduce by anyone other than the owner. This is a major factor driving biometrics. Most people believe that something you are is superior to something you know or have. Indeed, this seems plausible. However ...
if something you are is reproducible or can be captured, then there is the risk of abuse. In such cases something you have, like a key that cannot be reproduced is superior.
102
A threat that plagues passwords will likely have an equivalent counterpart affecting biometrics. Keystroke loggers are a particularly nasty threat to passwords. Those running within a system can capture all manner of authentication activity using a keyboard. Similarly,
A Biometric Template Logger (BTL) could also be used to capture minutiae attributes before they are sent over a network.
103
Design validation seeks to address the following areas
* Requirements - Have all requirements been addressed? * Operations - Are organizational needs met? * Functionality - Does it work as desired? * Weaknesses - Can it be circumvented?
104
The most common sources of security requirements are
laws, regulations, industry standards, and organisational policies.
105
An efficient way to determine if a system meets access control requirements is to list all applicable security requirements in a matrix. Using what headings?
Unique identifier Sources Requirement - Interpretation
106
The two elements of functionality that a security architect should bear in mind when reviewing an access control mechanism are
* Operational - The access control must work as intended with the desired results. * Usable - A difficult-to-use access control mechanism will ultimately prove ineffective.
107
The overall goal of access control design validation is
to ensure that the questions regarding requirements, operations, functionality, and weaknesses are not left unanswered.
108
How should access control design validation proceed
Identify access control gaps Identify policy deficiencies Look for obvious ways to circumvent controls Identify countermeasures Use defence in depth to counteract weaknesses
109
Three Different testing paradigms are useful in determining the effectiveness of a control.
Exercise controls Penetration testing Vulnerability assessment
109
What three elements test the extent to which access controls support security requirements.
- implemented correctly - operating as intended - producing the desired outcome
110
Different testing paradigms are useful in determining the effectiveness of the control. What does the "Exercise controls" paradigm do?
Determines if the controls are working as expected by running test cases
111
Different testing paradigms are useful in determining the effectiveness of the control. What does the "penetration testing" paradigm do?
Determines if the controls can be circumvented
112
Different testing paradigms are useful in determining the effectiveness of the control. What does the "Vulnerability assessment" paradigm do?
Identifies potential flaws in the system
113
The security architect should bear in mind the relationships between access control attributes when developing test procedures. Entities and authentication factors -
Access control testing should ensure that the link between an entity and authentication factor is resistant to compromise and tampering.
114
The security architect should bear in mind the relationships between access control attributes when developing test procedures. Subjects and rights
Testing should determine if subject interactions with the system could result in the ability to increase rights or not.
115
The security architect should bear in mind the relationships between access control attributes when developing test procedures. Critical objects should
have their permissions checked.
116
1. Which of the following represents the type of access given to a user? A. Permissions B. Subjects C. Objects D. Rights
The correct option is A Permissions regulate the type of access a subject is given to an object. Common permissions include: read, write, delete, and execute.
117
2. The most widely adopted access control method is A. Discretionary access control. B. Mandatory access control. C. Rule-based access control. D. Role-based access control.
The correct option is A Discretionary Access Control is the predominant access control technique in use today. Most commodity systems implement some form of DAC.
118
3. No read up and no write down are properties of A. Discretionary access control. B. Mandatory access control. C. Rule-based access control. D. Role-based access control.
The correct option is B This is the basic functionality of Mandatory Access Control. The fundamental principles of MAC prevent a subject from reading up and writing down between classifications.
119
4. Access control for proprietary distributable content is best protected using A. Discretionary access control. B. Digital rights management. C. Distributed access control. D. Originator controlled
The correct option is B Among the options given, only DRM provides a means to control proprietary content
120
5. When designing a system that uses least privilege, a security architect should focus on A. Business requirements. B. Organizational mission. C. Affected usability. D. Disaster recovery.
The correct option is D Disasters are unlikely; therefore, least privilege should not be designed with limitations.
121
6. Separation of duties is BEST implemented using A. roles. B. permissions. C. rights. D. workflows.
The correct option is A Separation of duties is best implemented with roles composed of granular rights and permissions.
122
7. Which of the following is the BEST supplemental control for weak separation of duties? A. Intrusion detection B. Biometrics C. Auditing D. Training
The correct option is C Accountability becomes more important when separation of duties is weak or unachievable. Auditing is paramount. Consider implementing object-level auditing for individuals with multiple roles. Identify key areas where abuse might occur, and implement multiple methods to monitor for violations.
123
8. Centralized access control A. Is only implemented in network equipment. B. Implements authentication, authorization, and accounting. C. Is implemented closest to the resources it is designed to protect. D. Is designed to consider and accept business partner authentication tokens.
The correct option is B Authentication, authorization, and accounting are important aspects of centralized access control.
124
9. Firewalls typically employ A. Centralized access control. B. Decentralized access control. C. Federated access control. D. Role-based access control.
The correct option is A A firewall with an integrated authentication mechanism is an example of a centralized access control device using the gatekeeper approach. This type of approach is primarily used to control access to resources and services at particular locations within the protected network.
125
10. A feature that distinguishes decentralized from centralized access control is its A. audit logging. B. proxy capability. C. security kernel. D. shared database.
The correct option is D Decentralized access control relies on shared databases.
126
11. Federated access control A. is implemented with RADIUS. B. is designed to be mutually exclusive with single sign-on. C. is implemented closest to the resources it is designed to protect. D. is designed to consider and accept business partner authentication tokens.
The correct option is D Federated Access Control enables a business partner type of single sign-on.
127
12. Lightweight Directory Access Control is specified in A. X.509 B. X.500 C. RFC 4510 D. RFC 4422
The correct option is C RFC 4510 describes a simplified X.500 Directory Access Control protocol.
128
13. This technique is commonly used to collect audit logs: A. Polling B. Triggers C. Workflows D. Aggregation
Polling by a centralised server is commonly used to query other servers to periodically collect events.
129
14. A word processing application, governed by Discretionary Access Control (DAC), executes in the security context of the A. end user. B. process itself. C. administrator. D. system kernel.
The correct option is A In DAC, non-system processes run in the memory space owned by the end user.
130
15 In DAC, non-system processes run in the memory space owned by the end user. A. are prohibited by policy. B. may be able to access all the user's files. C. are a new technology that is difficult to evaluate. D. may be derived from untrustworthy open source projects.
The correct option is B Vulnerabilities in the design or implementation could enable network penetration.
131
16. Business rules can BEST be enforced within a database through the use of A. A proxy. B. redundancy. C. views. D. authentication.
The correct option is C Views can be used as a type of access control for designated users or database requests.
132
17. A well-designed demilitarized zone (DMZ) prevents A. direct access to the DMZ from the protected network. B. access to assets within the DMZ to unauthenticated users. C. insiders on the protected network from conducting attacks. D. uncontrolled access to the protected network from the DMZ.
The correct option is D The goal of a DMZ is to prevent or control information flow from outside to inside
133
18. Dual control is primarily implemented to A. complement resource-constrained separation of duties. B. distribute trust using a rigid protocol. C. support internal workflows. D. supplement least privilege.
The correct option is B Dual control requires explicit separation of duties and protocols.
134
19. A well-designed security test A. requires penetration testing. B. is documented and repeatable. C. relies exclusively on automated tools. D. foregoes the need for analysis of the results.
The correct option is B The results of a test that is not documented or repeatable are questionable.
135
What does analogue multiplexing do
shifts conversations into predefined channels of frequency division multiplexers
136
_______________ was used to encrypt voice by the Allies.
Pulse Code Modulation (PCM)
137
____________ represents one of the earliest methods developed to digitize an analog signal, such as human voice or facsimile transmission.
Pulse Code Modulation PCM
138
How does PCM work
First, the analog signal is sampled at predefined time intervals. Next, each sample, which can have an infinite number of heights, is quantized into a predefined value that is closest to the height of the signal. Then, the resulting height is encoded into a series of bits.
139
The data rate of a T1 line is 1.544 Mbps, how do we work that out
24 voice calls were sampled and encoded into 8 bits, and a framing bit was added to provide a pattern used for synchronisation. This was the well-known T1 frame, which comprises 193 bits (8 × 24 + 1) Because sampling occurs 8000 times per second, the data rate of the now ubiquitous T1 line became 193 bits/ frame × 8000 frames/second, or 1.544 mb per second
140
What is a T2 Line
A T2 consists of four T1 lines multiplexed with additional framing that is used between telephone company offices operates at 6.312Mbps
141
What is a T3 Line
28 T1 lines multiplexed operating at 44.736 Mbps
142
The use of packet-switched networks offered certain advantages over the use of the telephone network for transporting data?.
1. numerous data sources could be routed over common high-speed circuits. 2. each packet had its integrity checked via the use of a Cyclic Redundancy Check (CRC) 3. Packet switching could make use of alternate routes
143
Why did CRC offer superior integrity checking than when asynchronous data is transmitted via the telephone link
Asynchronous could only provide a parity bit, which cannot detect multiple errors
144
Although packet networks have significant advantages over circuit-switched networks, they also have many disadvantages. Foremost among the disadvantages was
The delay resulting from the need to retransmit packets because of CRC mismatches caused by spurious hits on circuits resulting primarily from machinery and weather conditions.
145
The early packet networks previously described were based on the _______ protocol. Their development paved the way the growth of a new type of packet network based on the _______ protocol
X25 TCPIP
146
VOIP There are several key areas of concern in the development of a network architecture designed to move digitized voice over a packet network originally developed to transport data. Those concerns include
1. the end-to-end delay associated with packets carrying digitized voice, 2. jitter, 3. the method of voice digitization used, 4. the packet loss rate, and 5. security.
147
What is Jitter and why is it a problem
Jitter represents the variation in packet transit caused by queuing, contention, and the propagation of data through a network? Distorts sound
148
While there are numerous voice protocols that have attained a degree of prominence, this section will focus on an umbrella protocol and two signaling protocols. The umbrella protocol is referred to as the
H.323 Recommendation, which defines a series of protocols to support audiovisual communications on packet networks.
149
VOIP Session Initiation Protocol (SIP) defines .
the signaling required to establish and tear down communications, including voice and video calls flowing over a packet network
150
VOIP Signalling System 7 (SS7), which represents
Signaling system protocol originally used for establishing and tearing down calls made over the world's series of public switched telephone networks. However, to make a call over a packet network such as the Internet, SS7 information must be conveyed. This occurs by transporting SS7 over the Internet Protocol (IP).
151
An H.323 terminal (client)
An endpoint in a LAN that participates in real-time, two-way communications with another H.323 terminal, gateway, or multipoint control unit (MCU). Under the H.323 standard, a terminal must support audio communication and can also support audio with video, audio with data, or a combination of all three.
152
An H.323 gateway (GW) provides ...
The physical and logical connections from a packet-switched network to and from circuit-switched networks.
153
Gatekeepers are optional devices within an H.323 network. When present they perform three important call control housekeeping functions, which assist in the preservation of the integrity of the packet network. Those functions are ...
admission control, address translation, and bandwidth management.
154
MCU A Multipoint Control Unit (MCU) represents an endpoint on a LAN that provides the capability for
three or more terminals and gateways to participate in a multipoint conference.
155
The collection of all terminals, gateways, and multipoint control units managed by a single gatekeeper is known as an
H.323 Zone.
156
SIP The Session Initiation Protocol (SIP) represents an application layer signaling protocol that enables
telephony and VolP services to be delivered over a packet network.
157
A comparison of two methods of supporting voice communications over ip networks underscores the considerable difference between the two protocols. The ___(A)_____ protocol defines a unified system to support multimedia communications over IP networks, providing support for audio, video, and even data conferencing. Within the umbrella protocol, it also defines methods for handling device failures, such as using alternative gatekeepers and endpoints, and messages are encoded, ______(B) ____ was developed to initiate a call, referred to as a session, between two devices and has no support for multimedia conferencing.
H323 SIP
158
This standard defines the manner in which public switched telephone networks (PSTNs) perform call setup and breakdown, routing, and control by exchange signalling information over a digital signalling network that is separate from the network which actually
SS7, a mnemonic for Signaling System No. 7,
159
There are over 100 million facsimile devices in use around the world, the ability of one device to communicate with another is provided by the ____ protocol.
G3
160
What is the problem with the G3 standard.
By itself, the G3 standard does not directly deal with security. Although a modified Huffman coding is employed to reduce transmission time of each scanned line, anyone who has the knowledge to tap a transmission can more than likely decode the transmission.
161
Products that can be used to control the flow of data at the entryway to the network are referred to as
as perimeter controls
162
Filtering based on the contents of packet headers, such as the headers in IP, TCP, and UDP, are commonly incorporated into
firewalls
163
TCP is used to transport connection-oriented, reliable data, such as control information. UDP is used to transport connectionless data How would the two protocols handle a telephone call
a VolP call would require TCP data to convey the dialed number and other control information, while UDP would be used to transport digitized voice.
164
One of the major problems associated with the callback feature of security modems results from the use of
Local Area Signaling Service (LASS) codes. LASS codes are numbers entered on a telephone touchpad to access special features of the telephone system. Two well-known LASS codes are 67, which toggles Caller-ID blocking, and 69 for Call Return. By knowing how to use LASS codes, a hacker may be able to exploit the configuration of the callback feature of a security modem
165
______ are a combination of network layer firewalls and application layer firewalls.
Unified threat management (UTM) gateways
166
________________ are a relatively new technology, as compared to other firewall technologies, and the type of threats that they mitigate are still changing frequently. Because they are put in front of web servers to prevent attacks on the server, they are often considered to be very different than traditional firewalls.
Web application firewalls
167
Differences between routers and firewalls Transfer of packets
Router - uses table to look up forwarding address Firewall - tests, the packet if it fails it is discarded
168
Differences between routers and firewalls Degree of packet inspection
Router examines headers - for routing information Firewall goes deeper, sometimes checking the contents for login attempts
169
Differences between routers and firewalls Performing proxy services
Routers do not do proxy services Firewalls do
170
A typical HIDS consists of an agent on a host that identifies intrusions by analysing system calls, application logs, file-system modifications (such as password and access threshold files), and other host activities and state. These IDS types are commonly referred to as
as Network Behavior Analysis (NBA) IDS
171
Intrusion detection Inline Sensor
An inline sensor is deployed so that the network traffic it is monitoring must pass through it, much like the traffic flow associated with a firewall.
172
Intrusion detection Passive Sensor
A passive sensor is deployed so that it monitors a copy of the actual network traffic; no traffic actually passes through the sensor. Passive sensors are typically deployed so that they can monitor key network locations, such as the divisions between networks, and key network segments, such as activity on a demilitarized zone
173
What is a spanning port
A port that can see all of the traffic going through the switch.
174
What is a network tap
A network tap is a direct connection between a sensor and the physical network media itself, such as a fiber optic cable. The tap provides the sensor with a copy of all network traffic
175
What is an IDS load balancer
An IDS load balancer is a device that aggregates and directs network traffic to monitoring systems, including IDS sensors.
176
Unlike a network-based IDS, which can see all packets on the networks it monitors, a wireless IDS works by
sampling the traffic
177
Sometimes an IDS is offered with an ____, it is not an optimal IDS because ...
Access point (AP) It needs to divide its time between providing access and monitoring traffic
178
To operate effectively, an IPS must have an excellent
intrusion detection capability.
179
An IPS itself should not become a liability by becoming subject to one or more types of network or computer attacks. Thus, some IPS products .
are designed to be installed without an IP network address. Instead, they operate promiscuously, examining each packet flowing on the network and responding to predefined attacks by dropping packets, changing equipment settings, and generating a variety of alerts.
180
SIEM technology is typically deployed to support three primary use cases:
* Compliance through log management and compliance reporting * Threat management through real-time monitoring of user activity, data access, and application activity and incident management * A deployment that provides a mix of compliance and threat management capabilities
181
Deciding what events to send to the SIEM is often challenging. The security architect needs to be aware of two capacity limits that SIEM systems have:
Storage. How much space will the events take? Events per second.
182
There are two specific areas that the security architect should begin to focus on as they look to deploy SEIM systems into the enterprise:
1. Bandwidth utilisation 2. HTTP Tunneling
183
Give an example of an SEIM rule that would target bandwidth utilisation
"if the bandwidth directed to my web servers is greater than 40Mb/s for 10 minutes or more, trigger an alert."
184
Why should SEIMs be configured to look for HTTP Tunneling
If users are tunneling other protocols through HTTP they are likely attempting to evade controls, or it could be malware attempting to evade controls.
185
If users are tunneling other protocols through HTTP they are likely attempting to evade controls, or it could be malware attempting to evade controls. The security architect will need to create a rule that
monitors for TCP port 80 or 443 traffic that is NOT HTTP protocol based.
186
One or more stations and an access point are referred to as a Basic Service Set (BSS). To differentiate one BSS from another, each access point is assigned a
Service Set identifier (SSID). The SSID is periodically broadcast by the access point
187
One popular method to increase wireless security, which is not particularly practical when facing network-savvy hackers, is
to turn off SSID broadcasting.
188
Wireless LANs can communicate is two different ways referred to as
as peer-to-peer and infrastructure.
189
In peer-to-peer mode, stations
communicate directly with one another.
190
In the infrastructure mode of operation, stations communicate via the use of
an access point. (Wireless router)
191
The wireless access point, which is more popularly referred to as a wireless router when used in a home or small business, is the most common communications product used to connect wireless stations to a corporate LAN. In actuality, the basic access point is
a two-port bridge, with one port representing the wireless interface while the second port is the wired interface.
192
When functioning as a bridge, the access point operates according to the three-F rule,
flooding, filtering, and forwarding, as it builds a table of MAC addresses associated with each port.
193
BSS
One or more stations and an access point are referred to as a Basic Service Set BSS
194
When two BSSs are connected via a repeater or wired connection, they form an
Extended service set (ESS)
195
The ESS has an identifier or network name referred to as an
Extended Service Set Identifier (ESSID).
196
The ESSID can be considered as the network identifier for
the wireless network.
197
Devices may be set to "any" or to a specific ESSID. When set, they will
only communicate with other devices using the same ESSID.
198
The original security for wireless LANs, was
Wired Equivalent Privacy (WEP)
199
What was wrong with WEP
It was broken by several persons several years ago
200
After WEP In an attempt to minimize the vulnerability of wireless transmissions, several additional security-related protocols were developed. These included
two versions of Wi-Fi Protected Access (WPA and WPA2), and two new wireless-security-related standards from the IEEE referred to as the 802.11i and 802.1X.
201
802.1X includes a security protocol referred to as the
Temporal Key Integrity Protocol (TKIP).
202
Both WPA and WPA2 represent security protocols created by
the Wi-Fi Alliance
203
TKIP was designed to add a level of security beyond that provided by WEP. To do so, TKIP added
1. a key mixing function, 2. a sequence counter that protects against replay attacks, and 3. a 64-bit message integrity check to eliminate the potential of a man-in-the-middle attack.
204
TKIP was launched during 2002 and has been superseded by more robust encryption methods, such as
AES and CCMP 40
205
Under WPA2, two modes of operation are supported:
Personal mode and Enterprise mode.
206
Under WPA2, two modes of operation are supported: Personal mode and Enterprise mode. Personal mode was developed to support wireless security in the home and small office environment that lacked access to an authentication server. This mode of operation is referred to as __________(1) __________, and its use requires wireless network devices to ________________(2)
1. Pre-shared key (PSK), and its use 2. encrypt traffic using a 256-bit key. That key can be entered as a passphrase of 8 to 63 printable ASCII characters or as a string of 64 hex digits.
207
It is important to note that although WPA and WPA2 are not IEEE standards, they
implement the majority of the IEEE 802.11 standard, with WPA2 supporting the Advanced Encryption Standard (AES).
208
AES
Advanced Encryption Standard
209
AES supports three block ciphers
three block ciphers; AES-128, AES-192, and AES-256.
210
What is the block size of each of the three block ciphers AES-128, AES-192, and AES-256.
They are all 128Bit, the number refers to the key size
211
block size refers to
the fixed-length chunk of data that a block cipher processes at a time
212
Are WPA and WPA2 compatible with the 802.11i standard.
While WPA and WPA2 represent a majority of the 802.11i standard, they are not fully compatible with it. While 802.1 li makes use of the AES block cipher,
213
While 802.11 makes use of the AES block cipher, both the original WEP and WPA use
The RC4 stream cipher. Another difference
214
The 802.1li architecture includes support for the 802.1X standard as an
authentication mechanism based on the use of the Extensible Authentication Protocol (EAP)
215
CCMP
Cipher block chaining message authentication an encryption protocol based on AES
216
why is the 802.11i standard well suited to the enterprise
1. support for the 802.1X standard for authentication 2.The use of AES based counter mode with CCMP
217
The 802.1x standard provides
port based authentication requiring devices to be authenticated prior to gaining access to a LAN
218
Under the 802.1x standard the client node is referred to as
the supplicant
219
In 802.1x if the authentication server accepts the supplicant's request,
the authenticator opens the port to the supplicant's traffic, otherwise it is blocked.
220
In addition to the use of 802.11i and 802.1x enhancements another technique commonly used to provide a high level of security on wireless networks
is the use of a layer 3 VPN, an alternative security mechanism that can be valuable when users are traveling or their organisation does not fully support the 802.1X standard.
221
Through the use of virtual LANs, it becomes possible to partition switch-based networks into zones of control. Why is this good?
1. it can restrict who can access devices attached to specific switch ports, 2 It can enhance throughput by limiting broadcast traffic.
222
The most prominent use of content filtering is in
programs that operate as add-ons to Web browsers or at a corporate gateway, blocking unacceptable messages that might be pornographic or racist or otherwise harmful
223
Anti-malware software can be considered as a special type of
Content filter
224
________________ is the building block upon which anti-spam products operate.
Content filtering
225
HTTPS inspection allows a firewall to
terminate outbound HTTPS sessions at the firewall.
226
HTTPS inspection allows a firewall to terminate outbound HTTPS sessions at the firewall. How is this accomplished
This is accomplished by acting as a trusted man-in-the-middle. When a request is made of the firewall for an HTTPS protected resource, the firewall will establish a new connection to the destination server and retrieve its SSL certificate. The firewall then copies the information from the certificate and creates its own certificate using these details and provides that to the client. As long as the client trusts the root certificate of the firewall the process is completely transparent to the end user.
227
Some common examples of mobile code include code developed using script languages such as
JavaScript and VBScript, Java applets, ActiveX controls, Flash animations, and even macros embedded within Microsoft Office documents such as Excel and Word documents.
228
DLP
Data loss prevention
229
There are three broad categories of DLP that the security architect needs to be familiar with as they plan the deployment of a solution:
Enterprise DLP solutions Channel DLP for specific channels like email DLP-lite - monitors only specific protocols
230
It is imperative that the security architect continue to be aware of the absolute need to ____________________ in the planning and operationalization of DLP.
involve non IT stakeholders
231
The TCP/IP protocol suite in effect combines
the upper three layers of the OSI model (application, presentation, and session),
232
One of the main challenges for the security architect with regards to social media and more broadly, social networking technologies in the enterprise, comes from
the intersection of the tremendous increase in smart device capabilities and the Bring Your Own Device (BYOD) phenomenon that has become prevalent in recent years
233
A revolutionary piece of malware, being the first to have a successful and continuous run propagating through social networks.
KOOBFACE
234
In order to determine what social networks the affected user is a member of, the KOOBFACE downloader
checks the Internet cookies in the user's machine.
235
The components of the KOOBFACE botnet owed their continued proliferation to
to gratuitous link-sharing behaviors seen commonly on social networking sites.
236
Why are Social Media worms like KOOBFACE a problem for security architects
The malicious content is hosted outside of the security infrastructure of the organisation.
237
The most widely used security protocol is
SSL Secure Sockets Layer
238
HyperText Transmission Protocol (HTTP). SSL has been used over the past few years to migrate to a derivative IETF standard referred to as
Transport Layer Security (TLS) that is very similar to SSL Version 3.0; these standards are often referred to interchangeably in this
239
Does SSL support all TCP features
It is important to note that SSL does not support some TCP features, such as out-of-band data.
240
The SSL protocol was developed by
Netscape Communications Corporation in 1994.
241
Explain the seven step process through which SSL/TLS communications are set up
1. After building a TCP connection, the SSL handshake is started by the client. 2. The client sends a number of specifications: which version of SSL/TLS it is running, what ciphersuites it wants to use, and what compression methods it wants to use. 3. The server checks what the highest SSL/TLS version is that is supported by them both, picks a ciphersuite from one of the client's options (if it supports one), and optionally picks a compression method. 4. After this the basic setup is done, the server sends its certificate. 5. Having verified the certificate and being certain this server really is who he claims to be (and not a man in the middle), a key is exchanged. This can be a public key, a PresharedSecret, or simply nothing, depending on the chosen ciphersuite. 6. Both the server and the client can now compute the key for the symmetric encryption. 7. The client tells the server that from now on, all communication will be encrypted, and sends an encrypted and authenticated message to the server.
242
To close an SSL connection, ______________ 'alert' is used. If an attacker tries to terminate the connection by finishing the TCP connection (injecting a FIN packet), both sides will know the connection was improperly terminated. The connection cannot be compromised by this though, merely interrupted.
close_notify
243
To close an SSL connection, a close_notify 'alert' is used. Why is this important
If an attacker tries to terminate the connection by finishing the TCP connection (injecting a FIN packet), both sides will know the connection was improperly terminated.
244
Although SSL permits both the client and the server to authenticate each other, typically only the server is authenticated in the SSL layer. Clients are primarily authenticated
in the application layer, through passwords sent over an SSL-protected communications link between client and server
245
Is the client or the server typically authenticated in the application layer
the client, the server is normally authenticated in the SSL layer
246
A key limitation of SSL/TLS is
the fact that information passed over a secure connection becomes nonsecure when the server being accessed stores the received data on a hard drive.
247
A VPN interconnects two or more locations via tunneling. There are two basic types of VPN tunnelling:
voluntary and compulsory
248
Under voluntary VPN tunnelling which end manages the connection setup process.
The client
249
Under compulsory tunneling, what is responsible for managing the VPN connection setup process.
the communications carrier network provider
250
Under voluntary tunneling, what are the two steps required,
The client first initiates a connection to the communications carrier, which is an Internet service provider (ISP), when establishing an Internet VPN. Then, the VPN client application creates the tunnel to a VPN server over the connection.
251
Since the early 1980s, several computer network protocols were developed to support VPN tunnels. Some of the more popular VPN tunneling protocols include
- the Point-to-Point Tunneling Protocol (PPTP), - Layer 2 Tunneling Protocol (L2TP), - IP Security (IPSec), - a combination of L2TP and IP Sec referred to as L2TP/IPSec, and TCP Wrappers.
252
PPTP is built on top of the ___________________, which is commonly used as the login protocol for dial-up Internet access. PPTP stores data within
Point-to-Point Protocol (PPP)
253
How does PPTP store and transmit data
PPTP stores data within PPP packets, then encapsulates the PPP packets within IP datagrams for transmission through an Internet-based VPN tunnel.
254
PPTP authentication uses PPP-based protocols such as
- the Password Authentication Protocol (PAP), - the Challenge-Handshake Authentication Protocol (CHAP), - and the Extensible Authentication Protocol EAP
255
A key advantage of PPTP is
its inclusion in just about every version of Windows. Thus, Windows servers also can function as PPTP-based VPN servers without having an organization bear any additional cost.
256
Three key disadvantages of PPTP are
- Vulnerable to man in the middle attacks - Only supports single factor (password based) authentication - It has failed to embrace a single standard for authentication and encryption
257
Another disadvantage of PPTP is its failure to embrace a single standard for authentication and encryption. What does this mean
Thus, two products that both fully comply with the PPTP specification can be totally incompatible with each other if they encrypt data differently.
258
Numerous concerns have arisen over the level of security PPTP provides compared to alternative VPN protocols. As a result of questions regarding its security, PPTP has been made obsolete by
by Layer 2 Tunneling Protocol and IPSec.
259
Similar to PPTP, L2TP exists at the data link layer (Layer 2) in the OSI reference model; hence, the origin of its name. However, in actuality, L2TP is a
Layer 5 protocol and operates at the session layer of the OSI model using UDP Port 1701.
260
The two endpoints of an L2TP tunnel are called
LAC (L2TP Access Concentrator) and the LNS (L2TP Network Server). The LAC is the initiator of the tunnel, while the LNS is the server, which waits for new tunnels to be established. Once a tunnel is established, network traffic is bidirectional.
261
There are two basic types of tunneling: compulsory and voluntary. Under L2TP, compulsory tunneling is ideal for a business environment. This is because
the tunnel is created from the LAC via the Internet to the LNS on a distant corporate network, and neither remote client has knowledge of the tunnel nor needs L2TP client software. Instead, each remote client creates a PPP connection to the LAC and is then tunneled to the LNS.
262
When remote clients need to access a LAC to gain access to a distant corporate network, this is called
compulsory tunneling
263
True or false L2TP does not provide any encryption.
True
264
Under L2TP, how does authentication occur?
occurs via PPP at the LAC or the LNS.
265
IPSec operates at Layer _____ and secures _____________
3 secures everything in the network
266
Also, unlike SSL, which is typically built into every Web browser, IPSec requires
a client installation.
267
How is IPSec different from SSL
It is not only for web traffic, it covers all traffic
268
IPSec operates at the IP layer (Layer 3) of the Internet Protocol Suite, what is the effect of this.
The operation of IPSec at Layer 3 makes this security protocol more flexible than SSL/TLS and higher-layer protocols.
269
IPSec represents a family of security-related protocols. Each protocol was designed to perform different security-related functions. Those protocols and their functions include …
1. Authentication Header (AH): Provides authentication for IP datagrams as well as protection against replay attacks. 2. Encapsulating Security Payload (ESP): Provides authentication, data integrity, and confidentiality of packets transmitted. 3. Internet Key Exchange (IKE): It is an IPSec protocol that is used to set up a Security Association (SA) by handling negotiation of the encryption and authentication keys to be used by IPSec.
270
While ESP supports encryption-only and authentication-only modes of operation, what should one note
using encryption without authentication is strongly discouraged because it is insecure.
271
IPSec uses a Security Parameter Index (SPI), which points to a location in a Security Association Database (SADB), along with the destination address in a packet header, which together
uniquely identify a security association for that packet.
272
This operates directly above IP, using IP protocol number of 51. It is employed to authenticate the origin of data as well as provide for the data integrity of IP datagrams. In addition, it can optionally protect against replay attacks through the use of a sliding window technique and discarding old packets.
Authentication header
273
There are two "modes" of operation that are supported by AH and ESP This mode is used to protect end-to-end communications between two hosts. This protection can be either authentication or encryption or both, but it is not a tunnelling protocol. Thus, it has nothing to do with a traditional VPN
Transport mode
274
There are two "modes" of operation that are supported by AH and ESP Under this mode the full IP header as well as payload data is encapsulated, which enables source and destination addresses to be different from those of the original packet. This encapsulation permits the packet to flow between two intermediary devices that form the tunnel, such as IPSec-compatible routers.
Tunnelling model
275
ESP represents the portion of IPSec that
provides origin authentication, data integrity, and confidentiality of packets. ESP also supports encryption-only.
276
Unlike AH, ESP does not
Unlike AH, ESP does not protect the IP packet header.
277
Due to the lack of encryption and authentication in the L2TP protocol, it is often implemented
along with IPSec; the result is referred to as L2TP/IPSec,
278
Because the L2TP packet is both wrapped and hidden within the IPSec packet
no information about the content of the packet can be obtained from the encrypted packet.
279
An additional benefit from the use of IPSec with L2TP is the ability to enhance authentication via
the use of EAP
280
The socks protocol operates at layer
5 Session Layer
281
The SOCKS protocol is designed to
route packets between client-server applications via a proxy server.
282
A Cross-Site Request Forgery (CSRF) represents an attack method developed to fool a victim into
loading a Web page that contains a malicious request.
283
A cross-site scripting attack exploits the trust most users place in
accessing a Web-site.
284
Cross-site scripting attacks commonly occur in two basic forms,
when an attacker embeds a script in data pushed to the user as a result of a GET or POST request (first order) or when the script is retained in long-term storage before being activated (second order).
285
DNS rebinding represents an attack on
the insecure binding between DNS host names and network addresses.
286
Through a DNS rebinding attack, the attacker is able to bypass a same-origin- policy restriction because
both the victim and attacker have the same host name,
287
Time of Check/Time of Use (TOC/TOU) represents two types of attacks that are based on
changes in principals or permissions
288
Another attack that warrants attention is the wildcarding attack. This attack occurs when
access controls are set in error and open a security hole for unintended access. For example, if access control rules are set to *.edu, any .edu site can access the users resources
289
RMON
Remote monitoring
290
There are 3 main areas that the security architect needs to consider regarding security in the virtualised infrastructure that they manage.
Oversight Maintenance Visibility
291
1. Compare the frequency range of a person's voice to the size of the passband in a voice communications channel obtained over the telephone. Which of the following accounts for the difference between the two? A. The telephone company uses Gaussian filters to remove frequencies below 300 Hz and above 3300 Hz because the primary information of a voice conversation occurs in the passband. B. The telephone company uses low-pass and high-pass filters to remove frequencies below 300 Hz and above 3300 Hz because the primary information of a voice conversation occurs in the passband. C. The telephone company uses packet filters to remove frequencies below 500 Hz and above 4400 Hz because the primary information of a voice conversation occurs in the passband. D. The telephone company uses low-pass and high-pass filters to remove frequencies below 500 Hz and above 4400 Hz because the primary information of a voice conversation occurs in the passband.
The correct option is B The frequency range of a person's voice typically varies between 0 and 20 kHz, while a telephone channel has a passband of 3 kHz. The telephone company uses low-pass and high-pass filters to remove frequencies below 300 Hz and above 3300 Hz because the primary information of a voice conversation occurs in the passband. This allows more channels to be multiplexed onto a wideband circuit.
292
2. What is the data rate of a PCM-encoded voice conversation? A. 128 kbps B. 64 kbps C. 256 kbps D. 512 kbps
The correct option is B The data rate of PCM-encoded voice conversation is 64 kbps.
293
3. How many digitized voice channels can be transported on a T1 line? A. Up to 48 B. Up to 12 C. Up to 60 D. Up to 24
The correct option is D There can be up to 24 digitized voice channels on a T1 line.
294
4. How many T1 lines can be transported on a T3 circuit? A. 12 B. 18 C. 24 D. 36
The correct option is C Up to 24 T1 lines can be transported on a T'3 circuit.
295
5. The three advantages accruing from the use of a packet network in comparison to the use of the switched telephone network are a potential lower cost of use, a lower error rate as packet network nodes perform error checking and correction, and A. the ability of packet networks to automatically reserve resources. B. the greater security of packet networks. C. the ability of packet networks to automatically reroute data calls. D. packet networks establish a direct link between sender and receiver.
The correct option is C Three advantages associated with the use of packet networks in comparison to the use of the public switched telephone network include a potential lower cost of use, a lower error rate as packet network nodes perform error checking and correction, and the ability of packet networks to automatically reroute data calls.
296
6. Five VolP architecture concerns include A. the end-to-end delay associated with packets carrying digitized voice, jitter, the method of voice digitization used, the packet loss rate, and security. B. the end-to-end delay associated with packets carrying digitized voice, jitter, attenuation, the packet loss rate, and security. C. the end-to-end delay associated with packets carrying digitized voice, jitter, the amount of fiber in the network, the packet loss rate, and security. D. the end-to-end delay associated with packets carrying digitized voice, jitter, the method of voice digitization used, attenuation, and security.
The correct option is A Five VolP architecture concerns include the end-to-end delay associated with packets carrying digiticed voice, jitter, the method of voice digitization used, the
297
7. What is the major difference between encrypting analog and digitized voice conversations? A. Analog voice is encrypted by shifting portions of frequency, making the conversation unintelligible. B. Digitized voice is generated by the matrix addition of a hixed key to each digitized bit of the voice conversation. C. Analog voice is encrypted by shifting portions of amplitude to make the conversation unintelligible. D. Digitized voice is encrypted by the modulo-2 addition of a fixed key to each digitized bit of the voice conversation.
The correct option is A Analog voice is encrypted by shifting portions of frequency to make the conversation unintelligible. In comparison, the encryption of digitized voice occurs by the modulo-2 addition of a random key to each digitized bit of the voice conversation.
298
8. In communications, what is the purpose of authentication? A. Establishing a link between parties in a conversation or transaction. B. Ensuring that data received has not been altered. C. Securing wireless transmission. D. Verifying the other party in a conversation or transaction.
The correct option is D Authentication is the process of verifying the other party in a conversation or transaction.
299
9. What is the purpose of integrity? A. Integrity is a process that ensures data received has not been altered. B. Integrity is a process that ensures a person stands by his beliefs. C. Integrity is a process that ensures that the amount of data sent equals the amount of data received. D. Integrity is a process that ensures data received has been encrypted
The correct option is A Integrity is a process that ensures data received has not been altered.
300
10. The key purpose of the Session Initiation Protocol (SIP) is to A. define the protocol required to establish and tear down communications, including voice and video calls flowing over a packet network. B. define the signaling required to establish and tear down communications, including voice and video calls flowing over a PSTN. C. dehne the protocol required to establish and tear down communications, including voice and video calls flowing over a circuit-switched network. D. Define the signalling required to establish and tear down the communications, including voice and video calls flowing over a packet switched network
The correct option is D SIP defines the signalling required to establish and tear down communications to include voice and video calls flowing over a packet network.
301
11. Briefly describe the H.323 protocol. A. It represents an umbrella recommendation from the ITU that covers a variety of standards for audio, video, and data communications across circuit-switched networks. B. It provides port-based authentication, requiring a wireless device to be authenticated prior to its gaining access to a LAN and its resources. C. It defines the protocol required to establish and tear down communications, including voice and video calls flowing over packet network. D. It represents an umbrella recommendation from the ITU that covers a variety of standards for audio, video, and data communications across packet-based networks and, more specifically, IP-based networks.
The correct option is D The H.323 standard can be considered to represent an umbrella recommendation from the International Telecommunications Union (ITU) that covers a variety of standards for audio, video, and data communications across packet-based networks and, more specifically, IP-based networks such as the Internet and corporate Intranets.
302
12. What is the difference between RTP and RTCP? A. RTP defines a standardized port for delivering audio and video over the Internet, while the RTCP provides out-of-band control information for an RTP port. B. RTP defines the protocol required to establish and tear down communications, including voice and video calls flowing over a packet network, while the RTCP provides out-of-band control information for an RTP port. C. RTP defines a standardized packet format for delivering audio and video over the Internet, while the RTCP provides out-of-band control information for an RTP flow. D. RTP defines a standardized port for delivering audio and video over the Internet, while the RTCP defines the protocol required to establish and tear down communications, including voice and video calls flowing over a packet network.
The correct option is C The Real Time Protocol (RTP) defines a standardized packet format for delivering audio and video over the Internet, while the RTCP provides out-of-band control information for an RTP flow.
303
13. List the components defined by the H.323 standard. A. Terminal, gateway, gatekeeper, multipoint control unit (MCU), multipoint controller, multipoint processor, and H.323 proxy B. Path, gateway, gatekeeper, multipoint control unit (MCU), multipoint controller, multipoint processor, and H.323 proxy C. Terminal, gateway, gatekeeper, multipoint control unit (MCU), multipoint transmitter, multipoint receiver, and H.323 proxy D. Protocol, terminal, gatekeeper, multipoint control unit (MCU), multipoint controller, multipoint processor, and H.323 proxy
The correct option is A The H.323 standard defines the following components: Terminal, Gateway, Gatekeeper, MCU (Multipoint Control Unit), Multipoint Controller, Multipoint Processor, and H.323 Proxy.
304
14. What are some of the major functions performed by a security modem? A. Allows remote access to occur from trusted locations, may encrypt data, and may support Caller ID to verify the calling telephone number. B. Allows remote access to occur trom any location, may encrypt data, and may support Caller ID to verity the calling telephone number. C. Allows remote access to occur from a mobile location, may encrypt data, and may support Caller ID to verify the calling telephone number. D. Allows remote access to occur from trusted locations, may encrypt data, and may identify the calling telephone number.
The correct option is A A security modem represents a special type of modem that allows remote access to occur from trusted locations, may encrypt data, and may support caller ID to verify the calling telephone number.
305
15. The major difference between a router and firewall lies in three areas: A. Ipecaion, af parkers based he outine ables, sho degree of packet B. The transter of packets based on absolute addresses, the degree of packet inspection, and acting as an intermediate device by hiding the address of clients from users on the Internet. C. The transter of packets based on routing tables, the degree of packet inspection, and acting as an intermediate device by hiding the address of clients from users on the Internet. D. The transfer of packets based on routing tables, the degree of packet inspection, and creating a DMZ behind Internet-facing applications.
The correct option is C The major difference between a router and firewall lies in three areas: the transfer of packets based on routing tables, the degree of packet inspection, and acting as an intermediate device by hiding the address of clients from users on the Internet, a technique referred to as acting as a proxy.
306
16. What is the purpose of an intrusion detection system (IDS)? A. To hide the address of clients from users on the Internet. B. To detect unwanted attempts to access, manipulate, and even disable networking hardware and computers connected to a network. C. To detect and respond to predefined events. D. To prevent unauthorized access to controlled areas within a site or a building.
The correct option is B An IDS represents hardware or software that is specifically designed to detect unwanted attempts at accessing, manipulating, and even disabling networking hardware and computers connected to a network. In comparison, an IPS represents an active system that detects and responds to predefined events. Thus, the IPS represents technology built on an IDS system. This means that the ability of the IPS to prevent intrusions from occurring is highly dependent on the underlying IDS.
307
17. What are the two methods that can be used for wireless LAN communications? A. Peer-to-peer and infrastructure B. Peer-to-peer and cloud C. Cloud and infrastructure D. Peer-to-peer and remote
The correct option is A Wireless LANs can communicate is two different ways referred to as peer-to- peer and infrastructure.
308
18. What is the benefit of WPA over WEP for enhancing wireless LAN security? A. WPA permits the equivalent of wired network privacy and includes the use of TKIP to enhance data encryption. B. WPA implements a large portion of the IEEE 802.11i and includes the use of TKIP to enhance data encryption. C. WPA implements a large portion of the IEEE 802.11i and includes the use of IKE to enhance data encryption. D. WPA implements IEEE 802.11a and g and includes the use of IKE to enhance data encryption.
The correct option is B The original security for wireless LANs, referred to as Wired Equivalent Privacy (WEP), permits the equivalent of wired network privacy and nothing more. WEP was broken by several persons many years ago. WPA represents a security protocol created by the Wi-Fi Alliance to secure wireless transmission and was created in response to the security weakness of WEP. This protocol implements a large portion of the IEEE wireless security standard referred to as 802.11i and WPA included the use of the Temporal Key Integrity Protocol (TKIP) to enhance data encryption.
309
19. What is the purpose of the IEEE 802.1X standard? A. To provide port-based authentication. B. To provide port-based authorization. C. To detect and respond to predefined events. D. To secure wireless transmission.
The correct option is A The IEEE 802.1X standard provides port-based authentication, requiring a wireless device to be authenticated prior to its gaining access to a LAN and its resources. Under this standard, the client node is referred to as a supplicant while the authenticator is usually an access point or a wired Ethernet switch.
311