Tricky Questions Flashcards
Users of a mobile app authenticate with username, password, and the app logs their location (from GPS). How many different authentication factors is this using?
ONE!
Username and password are both something you know. While the app logs the GPS location, it doesn’t say that the auth process even looks at it.
A company has several contractors who work for about one week each quarter. What should be done with their accounts when they aren’t actively working for the company?
Disable the accounts. That leave the data there, and it’s easy to enable them again when the contractor is actively working again.
A company needs a strong authentication and authorization system that protects privacy of data, and that allows employees to use SSO. What should they use? Choices are OpenID, SAML, Kerberos, RADIUS
Kerberos.
OpenID is for Internet, not internal networks. SAML is for web apps. RADIUS is for remote access clients.
Which protocol is best for encrypting confidential data transferred over internal network? Choices are FTP, SSH, SNMPv3, SRTP
SSH
Which protocol is best for collecting network device configuration and statistics while protecting the confidentiality of the credentials used to connect to the devices? Choices are SSH, FTPS, SNMPv3, TLS
SNMPv3
This is Simple Network Management Protocol version 3. It has strong authentication mechanisms. None of the other choices monitor network devices.
Which type of device would be likely to use these as part of its configuration?
permit IP any any eq 80
permit IP any any eq 443
deny IP any any
Choices are firewall, proxy server, web server, jump server.
Firewall.
While this is a good configuration to protect a web server, it gets put on the firewall, not the web server itself.
A firewall protects subnet 10.0.1.0/24. It needs to use only secure protocols for remote management. It needs to block cleartext web traffic.
Which of the following rules already on this firewall needs to be changed to do this?
HTTPS Outbound, Any, 10.0.1.0/24, HTTPS, allow
HTTP Outbound, Any, 10.0.1.0/24, HTTP, allow
DNS, Any, 10.0.1.0/24, DNS, allow
HTTPS Inbound, 10.0.1.0/24, HTTPS, allow
HTTP Inbound, 10.0.1.0/24, HTTP, block
Telnet, 10.0.3.0/24, Telnet, allow
SSH, 10.0.1.0/24, Any, SSH, allow
HTTP Outbound, because that is cleartext web traffic and it is set to allow. That should be blocked.
Yes, Telnet should not be allowed ANYWHERE, however since that rule is for 10.0.3.0/24 subnet, and this router is protecting 10.0.1.0/24, it won’t ever be handling that traffic. Tricky question indeed.
A power plant has several standalone computers used to verify proper operation of various processes. Employees log into these computers using local accounts. We want to make sure these computers have no access to the internet, and cannot be connected to the organization’s network. What’s the best choice among:
- air gap the computers
- place the computers in a screened subnet
- create a separate isolated network for these computers
- place the computers in a VLAN
Air gap.
Both screened subnet and VLAN would add a risk of connections to the larger network and the internet. A separate isolated network would technically work however there is no stated need for the computers to communicate with each other, and that adds a risk of one getting infected somehow and then spreading it to the rest.
A router on a corporate network provides a path to a limited access network that is not advertised. A net admin needs to access this limited access network regularly. How can he configure his computer to access it?
- Implement QoS technologies
- Add a VLAN
- Use the route command
- Open additional ports on the router
Use the route command.
None of the other choices can add a routing path.
An admin places a file named passwords.txt with usernames of two accounts in it. This file was placed in the administrator account desktop on several servers. Why would this be done?
It’s a honeyfile. This distracts hackers from real documents. Since the file doesn’t contain passwords, just usernames, then it’s not a risk - and if the usernames are for accounts that don’t have access to anything important, even better.
What wireless network protocol provides encrypted authentication of users over TLS? Choices are EAP, PEAP, WPA2, WPA3.
PEAP.
WPA2 and WPA3 don’t use TLS. EAP by itself doesn’t provide encryption at all.
A wireless user had been accessing his network shares one morning, but later when trying to access the Internet got a popup marked as from the same wireless SSID that prompted him to login again. After logging in he couldn’t access his network shares but could access Internet. What happened here?
An Evil Twin access point tricked him. Odds are it stole his login credentials as well and is now using them to hack the network.
Your organization wants to upgrade VPN so that after the VPN client connects to the VPN server, all traffic from the VPN client is encrypted. What kind of VPN should you use?
Full tunnel. This encrypts that client’s Internet traffic too, not just the traffic to the organization’s network.
A supplier needs to connect several laptops to our organization’s network, but we are concerned about possible vulnerabilities from the laptops. How do we mitigate this risk?
Implement a jumpbox system. The supplier’s laptops will connect to the jumpbox and from there connect to our network.
We want to allow visiting business partners to be able to use an available Ethernet port in a conference room to be able to use VPN to connect to their headquarters. The same port should allow our own employees to connect to our own secure internal network. How can we do this?
Implement NAC.
One of your network services becomes disabled and this affects production. What can be used to determine which service was interrupted and why it happened. Choices are firewall logs, NIDS, syslog, network mapping.
Syslog
In storing passwords, some organizations will add a salt and a hash to the password, then repeat this several times before storing the result. What is the term for this process?
Key stretching
Which of these is not a shared authentication protocol?
OpenID Connect, Facebook Connect, LDAP, OAuth
LDAP
While this allows SSO for a given organization, it is not a shared protocol.
Tool used to collect wireless packet data
Aircrack-ng
Notice it specifies wireless. Wireshark is for wired packets.
Secure way to erase data from old hard drives before donating to charity
Cryptographic erase
Which key is used when sending an encrypted email?
Recipient’s public key
How does a secure web server decrypt a client’s session key?
Using the private key for the website. Session keys are encrypted using the site’s public key.
In which order should these three items be done?
Risk analysis
Business impact analysis
ALE
ALE, risk analysis, business impact analysis
Give an example of implicit deny
User A is added to group G. When this is done, user A no longer has read access to items in folder F.