Updated Midterm Flashcards
- When designing a network besides providing protection for network resources, describe the other two important concerns.
Dectection
IDS/IPS
Next Gen Firewall
Responding
network forensics
counter measure
- Describe in detail what a stateful firewall uses to determine whether to allow a packet entrance back thru a firewall.
A firewall that tracks the TCP session. Specifically source/destination IP address, source/destination port, flags, and sequence numbers.
- A third generation ___________ firewall is concerned with monitoring systems as DNS, web traffic, remote desktop, etc as the traffic moves through the firewall.
next gen
- Besides supporting normal stateful firewall operations, name two services provided by a next generation firewall.
IDS
URL filtering
- An example of a next generation firewall system is Cisco’s ________.
Firepower
- If an ASA firewalls are assigned security levels between 0 and 100 and by default traffic to flow from a _________ interface to a __________ interface.
outside, inside
- On a ASA firewall for the traffic to return back thru an interface a ________ rule must be configured.
NAT\ inspect rule
- In order for outside traffic to enter into a lower security region on a ASA firewall a ________ must be created on the firewall.
security zone
- You can configure a ________ port on an switch to collect all traffic moving thru an interface.
switch
- Wireshark needs _______ in order to collect traffic from the network.
NIC interface
- A __________ is the brains of wireshark and has the ability to converts binary information into intelligence.
dissector
- In Wiresharks terms a _______ contains layer 3 information such as IP.
packet
- In Wireshark terms a _______ contains layer 4 information such as port number.
segment
- A _______ is designed to detect suspicious traffic.
IDS
- Describe the three operations or functions SNORT can perform.
Packet Capture
Capture log packets going internally and externally
Packet Logging
Saves the network packets containing the traffic matching the IPS signature to the attack log
IDS
Monitors a network or systems for malicious activity or policy violations and sends a alert.
- Describe what can be configured in the 2 main parts of a SNORT signature.
1) Header
Action | protocol | SRC | SRC Port | Direction | DST | DST port
2) Body
message content sid
- In security onion ________ is normally used as the IDS systems to detect suspicious activity.
SNORT
- In security onion _______ is used to collect information of flows, websites visited, etc
BRO
- In security onion ________ can be used to display items seen in the logs of the previous 2 questions.
Sguil
- _______________ is the process of using some method to determine the operating system of a server.
OS fingerprinting
- _______________ is the process of using an automated tool to gather end user’s emails.
Email Havesting
- ____________ will gain information such as A, AAAA, CNAME and SOA records.
DNS harvesting
- When performing recon it is important to distinguish between _____ and physical servers.
virtual
- When protecting resources, you need to treat internal resources different from _______ resources.
external