Cybersecurity Fundamentals Part 3
52 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which activity is primarily focused on understanding vulnerabilities and their potential impacts in network security?

  • Risk Assessment [ID.RA] (correct)
  • Access Control [PR.AC]
  • Asset Management [ID.AM]
  • Network Security Governance [ID.GV]
  • What is the main purpose of implementing encryption in a network?

  • To enable end-to-end communication between devices
  • To analyze network traffic patterns for anomalies
  • To restrict unauthorized access to network resources
  • To protect data both in transit and at rest (correct)
  • Which function involves creating actions to follow during a network security event?

  • Log and Event Monitoring [DE.CM]
  • Business Continuity Planning [RC.RP]
  • Risk Assessment [ID.RA]
  • Network Incident Response Plan [RS.RP] (correct)
  • In the NIST framework, which activity is tasked with training users to recognize security threats?

    <p>Security Training [RP.AT]</p> Signup and view all the answers

    Which core function of the NIST framework evaluates the effectiveness of incident responses after an event?

    <p>Lessons Learned [RC.IM]</p> Signup and view all the answers

    What is the main role of Log and Event Monitoring within the Detect function?

    <p>To continuously monitor for anomalies and incidents</p> Signup and view all the answers

    Which of the following is NOT a component of the Protect function in the NIST framework?

    <p>Forensics [RS.AN-3]</p> Signup and view all the answers

    At which layer of the TCP/IP model does point-to-point communication between devices mainly occur?

    <p>Network Layer</p> Signup and view all the answers

    What is the primary goal of access control in network security?

    <p>To restrict unauthorized access to network resources</p> Signup and view all the answers

    Which of the following is NOT listed as a key responsibility of network security?

    <p>Remote user training on device usage</p> Signup and view all the answers

    What role do intrusion detection systems (IDS) play in network security?

    <p>They continuously monitor network traffic for security incidents</p> Signup and view all the answers

    Which of the following best describes perimeter defense in network security?

    <p>Filtering incoming and outgoing network traffic</p> Signup and view all the answers

    What is the purpose of network vulnerability management?

    <p>To identify and fix weaknesses in network configurations</p> Signup and view all the answers

    Which secure protocol is specifically mentioned for protecting data in transit?

    <p>IPSec</p> Signup and view all the answers

    What type of system would be utilized to prevent security incidents effectively?

    <p>Intrusion Prevention Systems (IPS)</p> Signup and view all the answers

    Which option is least likely to be a focus of network security training?

    <p>Enhancing personal productivity tools</p> Signup and view all the answers

    What is the primary goal of a Man-in-the-Middle (MitM) attack?

    <p>To intercept and manipulate communication.</p> Signup and view all the answers

    Which technique is NOT associated with Denial of Service (DoS) attacks?

    <p>Session hijacking.</p> Signup and view all the answers

    What countermeasure helps mitigate the risk of flooding attacks in Denial of Service (DoS)?

    <p>Rate limiting.</p> Signup and view all the answers

    What is one common method to detect unauthorized port scanning activities?

    <p>Host-based IDS/IPS.</p> Signup and view all the answers

    Which of the following best describes the term 'Brute Force Attack'?

    <p>Trying multiple username and password combinations to gain access.</p> Signup and view all the answers

    Which practice is a key component in mitigating the effects of brute force attacks?

    <p>Strong password policies.</p> Signup and view all the answers

    What is the purpose of SSL stripping in a Man-in-the-Middle attack?

    <p>To intercept and downgrade secure HTTPS connections to HTTP.</p> Signup and view all the answers

    Which of the following techniques relies on overwhelming a service with excessive requests?

    <p>SYN flood attacks.</p> Signup and view all the answers

    What is the primary function of a firewall in network security?

    <p>To act as a barrier between trusted and untrusted networks</p> Signup and view all the answers

    Which type of firewall inspects packets on a per-packet basis without maintaining any state information?

    <p>Packet Filtering Firewalls</p> Signup and view all the answers

    What security measure is implemented when a firewall blocks all traffic that does not match its defined rules?

    <p>Deny by default</p> Signup and view all the answers

    Which of the following is NOT a countermeasure against external threat actors?

    <p>Regular employee training sessions</p> Signup and view all the answers

    In firewall operations, what does 'filtering' primarily refer to?

    <p>Controlling incoming and outgoing network traffic</p> Signup and view all the answers

    What is the importance of having a reliable operating system for a firewall?

    <p>To ensure firewall immunity to intrusions</p> Signup and view all the answers

    What is the role of predefined security policies in firewall functionality?

    <p>To establish access rules for incoming and outgoing traffic</p> Signup and view all the answers

    Which of the following features is a characteristic of Stateful Inspection Firewalls?

    <p>They maintain a record of active connections.</p> Signup and view all the answers

    What is the primary function of an Intrusion Detection System (IDS)?

    <p>To alert on suspicious activity without taking direct action</p> Signup and view all the answers

    Which VPN type allows remote users to connect to the internal network?

    <p>Remote access VPN</p> Signup and view all the answers

    What is a significant drawback of signature-based detection methods used by IDS/IPS?

    <p>They exhibit poor performance with new or previously unseen threats.</p> Signup and view all the answers

    Which of the following is not an example of an application layer VPN?

    <p>PPTP</p> Signup and view all the answers

    What critical flaw in ARP contributes to the possibility of a Man in the Middle (MitM) attack?

    <p>ARP lacks authentication for ARP-Reply messages</p> Signup and view all the answers

    Which of the following describes a characteristic of the Intrusion Prevention System (IPS)?

    <p>It can take proactive measures to block or prevent threats.</p> Signup and view all the answers

    Which component of IPsec is responsible for providing encryption using symmetric algorithms?

    <p>Encapsulating Security Payload (ESP)</p> Signup and view all the answers

    What form of VPN encapsulates IP packets into a secure tunnel?

    <p>IPsec Tunnels</p> Signup and view all the answers

    What is the primary purpose of the Handshake Protocol in TLS?

    <p>To authenticate endpoints and establish a secure connection</p> Signup and view all the answers

    Which type of detection method establishes a baseline of normal behavior for alerts on deviations?

    <p>Anomaly-based detection</p> Signup and view all the answers

    Which of the following protocols specifically addresses the security of DNS queries and responses?

    <p>DNSSEC</p> Signup and view all the answers

    Which statement accurately describes Host-Based IDS (HIDS)?

    <p>It monitors system-level activities and logs on individual devices.</p> Signup and view all the answers

    What is the primary function of SSH in secure networking?

    <p>To enable secure remote access via encrypted interactive sessions</p> Signup and view all the answers

    Which IDS/IPS detection method uses predefined patterns to identify attacks?

    <p>Signature-based detection</p> Signup and view all the answers

    What type of communication does IPSec primarily secure?

    <p>IP communications at the network layer</p> Signup and view all the answers

    What type of VPN is designed to offer transport layer encryption?

    <p>Wireguard</p> Signup and view all the answers

    Which aspect of data does TLS ensure through its Record Protocol?

    <p>Encryption and authentication of transferred data</p> Signup and view all the answers

    What is a primary use case for SSH?

    <p>Secure remote management of servers</p> Signup and view all the answers

    Why is ARP spoofing considered a form of local ARP cache poisoning?

    <p>It impersonates devices to redirect traffic without detection.</p> Signup and view all the answers

    What is a key characteristic of 'secure protocols'?

    <p>They enhance standard protocols through cryptographic techniques.</p> Signup and view all the answers

    Study Notes

    Cybersecurity Fundamentals (Part 3)

    • Network Security: A set of measures and strategies to secure network infrastructure, protecting wired/wireless networks, routers, switches, firewalls, servers, and endpoints. Key responsibilities include access control, data protection, network monitoring, and intrusion detection.

    Key Responsibilities/Tasks

    • Access Control: Only authorized users and devices can access network resources.
    • Data Protection: Encrypts data in transit and at rest using protocols like IPSec, SSL/TLS to secure sensitive information.
    • Network Monitoring and Logging: Continuous monitoring of network traffic, detecting security incidents, monitoring network activity, analyzing logs to find anomalies, and using IDS/IPS systems to block or alert on suspicious activity and threats.

    Network Security (II)

    • Perimeter Defense: Security controls at the network perimeter to filter incoming/outgoing traffic (firewalls and DMZs), monitor/detect intrusion using IDS/IPS, and secure remote access with VPNs.
    • Network Vulnerability Management: Regularly assessing the network for vulnerabilities and taking action to mitigate them, such as ensuring network devices are configured securely (patches/updates), and conducting security assessments (penetration testing).

    Network Security (III)

    • Network Security Activities (NIST Framework Core Functions):
      • Identify: Asset Management (ID.AM), Risk Assessment (ID.RA), Network Security Governance (ID.GV).
      • Protect: Access Control (PR.AC), Network Segmentation (PR.AC-5), Encryption (PR.DS-2), Endpoint Protection (PR.PT), Security Training (RP.AT)
      • Detect: Network Traffic Analysis (DE.AE), Log and Event Monitoring (DE.CM), Intrusion Detection (DE.DP)

    Network Security (IV)

    • Respond: Network Incident Response Plan (RS.RP), Security Incident Investigation (RS.AN), Mitigation and Containment (RS.MI), Communication and Reporting (RS.CO), Forensics (RS.AN-3)
    • Recover: Business Continuity (BC) Planning (RC.RP), System Restoration (RC.RP), Lessons Learned (RC.IM), Post-Incident Review (RC.IM)

    TCP/IP Network Model

    • Key Points: Stacked protocol layers and data encapsulation. This shows a clear relationship between the TCP/IP and OSI models illustrating how protocols and services relate to each layer.

    TCP/IP Vulnerabilities, Threats and Attacks

    • Main Weakness: Lack of built-in security, and lack of native methods for encryption, integrity, and authentication.
    • Generic Threats/Attacks:
      • Sniffing: Unauthorized interception/monitoring of network traffic (exploits lack of encryption).
      • Spoofing: Masquerading as something or someone else in a network communication (lack of authentication).
      • Hijacking: Attacker takes control of an established network session/connection between two parties (lack of authentication/integrity and weaknesses in session management).
      • Man-in-the-Middle (MitM) Attacks: Attacker intercepts (and potentially alters) communication between sender and receiver without their knowledge (MitM exploits issues in the network layers).
      • Denial of Service (DoS): Make network resources, services, or applications unavailable to legitimate users by overwhelming them with excessive traffic/requests.
      • Hostile network activity: Actions taken by attackers or malicious actors to compromise network security, gain unauthorized access, or disrupt network operations. This includes actions like port scanning, brute-force attacks.

    Secure Protocols

    • Secure protocols: Address security concerns (confidentiality, integrity, authenticity) in data and communications, improving upon the classic TCP/IP functionality. Protocols can be implemented at various layers of the stack, applying cryptographic techniques.

    IPsec (Internet Protocol Security)

    • Network Layer (Layer 3): A suite of protocols used to secure IP communications at the network layer. Provides IP packet authentication and (optionally) encryption using HMAC and ESP. IKE provides secure key exchanges. Uses Asymmetric encryption, Different Hellman, Digital Certificates

    TLS (Transport Layer Security)

    • Transport Layer (Layer 4): Secure communication channel between a client and server at the transport layer. Provides data integrity, confidentiality, and authentication at the packet level. Uses Handshake Protocol and Record Protocol.

    SSH (Secure Shell)

    • Application Layer (Layer 7): Provides end-to-end encryption for interactive sessions, adds user authentication methods such as password and public keys.

    Perimeter Protection

    • Objective: Securing an organization's network by protecting the outer boundary (perimeter) from external threats/attacks.
    • Countermeasures:
      • Firewalls and network segmentation
      • Virtual Private Networks (VPNs)
      • Intrusion Detection and Prevention Systems (IDS/IPS)
      • Security Information and Event Management (SIEM) Systems
      • Web Application Firewalls (WAFs), Content Filtering

    Firewalls

    • Network Access Control Devices: Barrier between the organization's internal network and the untrusted external network. Uses filtering and controlling incoming/outgoing network traffic based on predefined security rules. All traffic passes through to permit or deny authorized traffic

    Virtual Private Networks (VPNs)

    • Extension of a private local network over an uncontrolled public network infrastructure.
    • Typical Function: Establishing secure connections to maintain the confidentiality of traffic, relies on tunneling by creating a logical connection between endpoints, encapsulating one protocol within another. Common use cases include secure interconnection across parts of an organization, and remote access for users to connect to the internal network.
      • Different ways of tunneling

    Intrusion Detection/Prevention Systems (IDS/IPS)

    • IDS: Monitors network/system activity for signs of unauthorized access, attacks, or abnormal behavior. Passive and alerts on potential threats.
    • IPS: Same detection methods as IDS, takes automated actions to prevent or mitigate detected threats. Proactive, blocking traffic to/from specific IP addresses, dropping malicious packets, and resetting connections.
    • Deployment Types: Network-based (NIDS) sensors monitor traffic, and host-based (HIDS) agents monitor individual device activities, such as file changes, logs, and system calls.
    • Detection Methods: Signature-based and Anomaly-based.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers key concepts in network security, including access control, data protection, and network monitoring. Learn how to secure network infrastructures and the responsibilities involved in maintaining cybersecurity. Test your knowledge on perimeter defense and intrusion detection strategies.

    More Like This

    Use Quizgecko on...
    Browser
    Browser