Chapter 7

You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure hat broadcast traffic sent by an accounting computer is only received by other accounting computers, and you want to impement ACLs to control traffic sent to accounting computers through the network. What should you do?
Use a router to configure a subnet for the accounting computers.
You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose?
Switch
Which of the following is an advantage of using switches to create virutal LANs?
Broadcast traffic travels to a subset of devices rather than to all devices on the network
Which characteristic of a switch can improve bandwidth utilization and reduce the risk of sniffing attacks on the network?
A switch filters port traffic based on MAC address
What characteristic of hubs poses a security threat?
Hubs transmit frames to all hosts on all ports
Which of the following devices does not examin the MAX address in a frame before processing or forwarding the frame?
Hub
Which of the following describes how a router can be used to implment security on your network?
Use an access control list to deny traffic from specific IP addresses
A relatively new employee in the data entry cubical farm was assigned a user account similar to that of all of the other data entry employees. However, audit logs have shown that this user account has been used to change ACLs on several confidential files and has accessed data in restricted areas. This situation indicates which of the following has occurred?
Privilege escalation
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions?
Privilege escalation
You’ve just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You’ve backed up to the router configuration to a remote location in an encrypted fil. You access the router configuration interface from your notebook coputer by connecting it to the conosole port on the router. You configured the management interface with a user name of admin and a password of password. What should you do to increase the security of this device?
Use a stronger administrative password
While developing a network application, a programmer adds functionally that allows her to access the running program. Without authentication, to capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. What type of security weakness does this represent?
Backdoor
Which of the following attacks, if successful, causes a switch to function like a hub?
MAC flooding
Which of the following switch attakcs associates the attacker’s MAC address with the IP address of the victim’s devices
ARP spoofing/poisoning
Which is a typical goal of MAC spoofing?
Bypassing 802.1x port based security
Which protocol should you disabl on the user access ports of a switch?
DTP
You’ve just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You’ve backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a user name of admin and a password of admin. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of the device?
Change the default administrative user name and password
Use an SSH client to access the router configuration
You’ve just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You’ve backed up the router configuration to a remote location in an encrypted file. You access the router configuration from your notebook computer using an SSH client with the user name of admin01 and a password of [email protected] You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?
Move the router to a secure server room
You’ve just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a locked server closed. You use an FTP client to regularly back up the router configuration to a remote server in an encrypted file. You access the router configuration interface from a notebook computer that is connected to the router’s concole port. You’ve configured the device with a user name of admin01 and a password of [email protected] You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?
Use SCP to back up the router configuration to a remote location.
Match the management option with the corresponding description
SSL
Uses public key cryptography
HTTP
Transfers data in clear text
SSH
Uses public key cryptography
Telnet
Transfers data in clear text
Console port
Cannot be sniffed
A vitual LAN can be created using which of the following?
Switch
When configuring VLANs on a switch, what is used to identify VLAN membership of a device?
Switch Port
You want to increase the security of your network by allowing only authenticated users to be able to access netowrk devices through a switch. Which of the following should you implement?
802.1x
Which of the following applications typically use 802.1x authentication?
Controlling access through a wireless access point
Controlling access through a switch
You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement?
VLANs
When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?
Trunk ports
You manage a network that uses switched. In the lobby your building are three RJ-45 ports connected to a switch. You want to make sure that vistors cannot plug in their computers to the free network jacks and connect to the netowrk. However, employees who plug into those same jacks should be able to conect to the network. What feature should you configure?
Port authentication
Which of the following solutions would you implement to eliminate switching loops?
Spanning tree
You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches?
Spanning tree
In which of the following situations would you use port security?
You want to restrict the devices that could connect through a switch port
You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You’ve had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the Internet. The library computers are in groups of four. Each group of four comptuers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do?
Configure port security on the switch
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isoluated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through thte switch, but you still need to access the network through the computer. What should you use this situation?
VLAN
Which of the following best describes the concept of a virtual LAN?
Devices on the same network logically grouped as if they were on separate networks
Your company is a small startup company that has leased office space in a building shared by other business. All business share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implmented?
VLAN
You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support?
Spanning tree
You are concerned about protecting your network from network based attacks from the internet. Specifically you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?
Anomaly based IDS
What do host based intrusion detection systems often rely upon to perform their detection activities?
Host system auditing capabilities
What actions can a typical passive Intrusion Detection System (IDS) take when it detects an attack?
The IDS logs all pertinent data about the intrusion
An alert is generated and delivered via email, the console, or an SNMP trap
Which of the following activities are considered passive in regards to the functioning of an intrusion detection system?
Listening to network traffic
Monitoring the audit trails on a server
An active IDS system often performs which of the following actions?
Update filters to block suspect traffic
Perform reverse lookups to identify an intruder
Which IDS method searches for intrusion or attack attempts by recognizing patterns or identities listed in a database?
Signature based
You have just installed a new network based IDS system that uses signature recognition. What should you do on a regular basis?
Update the signature files
Whatis the most common form of host based IDS that employs signature or pattern matching detection methods?
Anti-virus software
You have configured a NIDS to monitor network traffic. Which of the following describes an attack that is not detected by a NIDS device?
False negative
Which of the following describes a false positive when using an IPS device?
Legitimate traffic being flagged as malicious
If maintaining confidentiality is of the utmost importance to your organiation, what is the best response when an intruder is detected on your network?
Disconnect the intruder
Which of the following devices is capable of detecting and responding to security threats?
IPS
You want to create a collection of computers on your network that appear to have valuable data, but are really computers configured with fake datathat could entice a potential intruder. Once the intruder connects, you want to be able to observe and gather information about the methods of attack that are being deployed. What should you implement?
Honeynet
A honey pot is used for what purpose?
To delay intruders in order to gather auditing data
Your organization uses a web server to host an e-commerce site. Because this web server ahndles financial transactions, you are concerned that it could become a prime target for exploits. You want to implement a network security control that will analyze the contents of each packet going to or from the web server. The security control must be able to identify malicious payloads and block them. What should you do?
Implement an application-aware IPS in front of the web server
Match the fabric zoning with the description:
Hard Zoning
The SAN switch is configured with ACLs to restrict communications between SAN hosts and storage devices
Port zoning
Zone membership and access to SAN storage si based on the switch port a SAN host is connected to
Soft zoning
The SAN fabric naming service is configured such that a SAN host can view only the names of storage devices that are in the same zone
You are implementing an iSCSI that will be used by the file servers in your organization. You are concerned about security, so your design specifies the iSCSI initiators and targets must authenticate with each other before a connection over the SAN will be allowed. In addition, you want data being transferred over the SAN to be encrypted. Which of the following are true in the scenario
The Challenge-Handshake Authentication Protocol (CHAP) and Reverse CHAP can be used to mutually authenticate SAN hosts
The internet protocol security(IPSec) protocol can be used to encrypt data in transit
You are implementing a Fibre Channel SAN thata will be used by the database servers in your organization. You are concerned about secruity so your design specifies that SAN hosts must authenticate with each other before a connection over the SAN will be allowed. In addition, you want data being transferred over the SAN to be encrypted. Which of the following are true in this scenario?
The Diffie-Hellman Challenge Handshake Authentication Protocol(DH-CHAP_ can be used to mutually authenticate SAN hosts
The encapsulating Security Payload (ESP) protocol can be used to encrypt data in transit.
Match the SAN security control with the description
Port locking
Binds specific SAN IDs to specific SAN switch ports
Fabric zoning
Makes devices within a zone visible only to other devices within that same zone
Port type locking
Limits the type of devices that can connect to a SAN switch port.
Virtual SANs
Divides a SAN into multiple logical SANs
LUN Masking
Makes LUNs available to some SAN hosts and unavailable to other SAN hosts
You are designing a Fibre Channel SAN implmentation that will be used y the file servers in you orgnaization. Multiple volumes will be configured on the SAN, each used by different departments in your organization. It’s very important that only the appropriate server b able to connect to a given volume on the SAN. For example, the Salse and marketing server must not be allowed to connect to the SAN volume used by Human Resources. To enable this, you decide to use LUN masking. Which of the following is true in this scenario?
LUN masking provides weak security as it only obscures volumes on the SAN