Intrusion Detection & Prevention Systems Overview
32 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of an IDS?

  • To detect and log suspicious activity (correct)
  • To generate network traffic for analysis
  • To encrypt data stream within a network
  • To block all incoming network connections
  • Which of the following statements best describes a network-based IDS (NIDS)?

  • It is primarily used to encrypt data packets in transit.
  • It operates at the edge of the network to monitor traffic for multiple systems. (correct)
  • It runs on a single computer to protect that host only.
  • It requires a user to be present at all times for monitoring.
  • How does a forward proxy function in relation to user IP addresses?

  • It hides internal users' IP addresses when accessing the Internet. (correct)
  • It restricts users from accessing external websites.
  • It assigns random IP addresses to internal users for anonymity.
  • It exposes users' IP addresses to the external servers.
  • What is one of the key differences between an IDS and an IPS?

    <p>An IDS detects threats but does not take action, while an IPS reacts to suspicious activity. (A)</p> Signup and view all the answers

    What is a primary purpose of a reverse proxy?

    <p>To provide identity protection for servers rather than clients. (D)</p> Signup and view all the answers

    In what way does a proxy server manage security?

    <p>By filtering traffic at the application layer. (C)</p> Signup and view all the answers

    Which type of IDS runs specifically on one computer to monitor that host?

    <p>Host-based IDS (C)</p> Signup and view all the answers

    What role does a NAT server play in relation to proxies?

    <p>It forwards requests and responses between users and external servers. (D)</p> Signup and view all the answers

    What is the primary advantage of using DRaaS in disaster recovery planning?

    <p>It is highly scalable and cost-effective. (C)</p> Signup and view all the answers

    Which UPS classification provides continuous power by switching to a battery only when an outage occurs?

    <p>Standby UPS (D)</p> Signup and view all the answers

    What does the 3-2-1-1 rule emphasize regarding data backups?

    <p>Save backups on two media types and one offline. (B)</p> Signup and view all the answers

    What is the primary function of routers in a network?

    <p>To connect multiple networks and manage data paths. (B)</p> Signup and view all the answers

    Which of the following is true about BGP?

    <p>It is the only current EGP in use. (C)</p> Signup and view all the answers

    Which routing protocol uses a distance-vector algorithm calculated by hop count to determine routes?

    <p>RIP (B)</p> Signup and view all the answers

    What aspect does RTO (Recovery Time Objective) primarily define in disaster recovery planning?

    <p>Maximum allowable downtime for a network. (A)</p> Signup and view all the answers

    What does OSPF utilize to map and determine the best path for data in a network?

    <p>Link-state routing mechanisms. (D)</p> Signup and view all the answers

    Which statement is accurate regarding RAID 5 configurations?

    <p>It splits data evenly across three or more drives with one parity drive. (D)</p> Signup and view all the answers

    What differentiates Online UPS from Standby UPS?

    <p>Online UPS charges its battery continuously while providing power. (C)</p> Signup and view all the answers

    What is the primary function of a packet-filtering firewall?

    <p>To filter traffic based on pre-defined rules matching packet headers (C)</p> Signup and view all the answers

    Which feature is NOT typically found in a host-based firewall?

    <p>Protecting the integrity of a network router (A)</p> Signup and view all the answers

    Which type of firewall manages packets independently, without considering existing connections?

    <p>Stateless firewall (C)</p> Signup and view all the answers

    What is the function of RADIUS in network security?

    <p>To authenticate and authorize remote users (C)</p> Signup and view all the answers

    Which of the following is NOT a characteristic of malware?

    <p>Implementing firewall functions (D)</p> Signup and view all the answers

    What typically causes firewall failure?

    <p>Improper configuration of the firewall rules (D)</p> Signup and view all the answers

    Which of the following is the correct port number used by RADIUS for authentication?

    <p>1812 (B)</p> Signup and view all the answers

    What is NOT a category of disaster recovery contingency?

    <p>Virtual site (B)</p> Signup and view all the answers

    Which DSL type provides equal download and upload speeds, maxing out around 2 Mbps?

    <p>SDSL (B)</p> Signup and view all the answers

    Which characteristic describes a Trojan horse in malware?

    <p>Disguises itself as legitimate software (C)</p> Signup and view all the answers

    Which modulation technique is used in DSL connections for optimal data transfer?

    <p>Amplitude or phase modulation (B)</p> Signup and view all the answers

    Which SNMP version primarily enhances performance and security compared to its predecessor?

    <p>SNMPv2 (C)</p> Signup and view all the answers

    Which of the following best describes stateful firewalls?

    <p>They track established connections and packets in relation to those streams. (C)</p> Signup and view all the answers

    What is the main purpose of a disaster recovery plan?

    <p>To ensure the restoration of critical functionality and data after a disaster (B)</p> Signup and view all the answers

    Flashcards

    IDS (Intrusion Detection System)

    A system that monitors network traffic and alerts about suspicious activity. It cannot prevent attacks.

    NIDS (Network-based IDS)

    IDS deployed at the edge of the network to monitor and detect suspicious network traffic.

    HIDS (Host-based IDS)

    IDS running on a single computer to monitor and detect suspicious activity on that host.

    IPS (Intrusion Prevention System)

    A system that reacts to suspicious activity—detects AND blocks potential threats from entering the network.

    Signup and view all the flashcards

    Proxy Server

    An intermediary server between internal and external networks, filtering traffic.

    Signup and view all the flashcards

    Forward Proxy

    A proxy that acts as a NAT (Network Address Translation) server, hiding internal users' IP addresses from the internet. It requests web pages on behalf of a user.

    Signup and view all the flashcards

    Reverse Proxy

    A proxy that receives requests from the internet and forwards them to internal servers. It protects internal servers.

    Signup and view all the flashcards

    Network Address Translation (NAT)

    A technology that translates private IP addresses into public ones, allowing multiple devices behind a gateway to share a single public IP address, improving security and saving public IP addresses.

    Signup and view all the flashcards

    DRaaS

    A cloud-based disaster recovery solution offering high scalability and cost-effectiveness. It enables rapid takeover of business processes during a disaster.

    Signup and view all the flashcards

    PDU

    A power distribution unit that connects to a wall outlet and provides power to devices within a rack.

    Signup and view all the flashcards

    UPS

    A battery-powered backup providing continuous power to a device during power outages.

    Signup and view all the flashcards

    Backup

    A copy of data or program files created for archiving or safekeeping.

    Signup and view all the flashcards

    3-2-1-1 Rule

    A backup principle: 3 copies, 2 media types, 1 offsite, 1 offline. Ensures data protection.

    Signup and view all the flashcards

    RTO

    Recovery Time Objective: The maximum allowable time for a network to be down after a disaster.

    Signup and view all the flashcards

    RPO

    Recovery Point Objective: The amount of data loss a system can tolerate during an outage.

    Signup and view all the flashcards

    RAID 0

    RAID level 0 splits data evenly across multiple disks, offering speed but no redundancy.

    Signup and view all the flashcards

    Router

    A network device that connects and routes data packets between different networks.

    Signup and view all the flashcards

    Routing Protocol

    A set of rules routers use to communicate and discover the best path for data to travel.

    Signup and view all the flashcards

    Firewall

    A specialized device or software that filters or blocks network traffic, often placed between a private and public network.

    Signup and view all the flashcards

    Packet-filtering firewall

    The simplest type of firewall that examines packet headers (information about the packet) to decide whether to allow or deny traffic based on rules.

    Signup and view all the flashcards

    Stateful firewall

    A firewall that monitors packets based on existing traffic streams, tracking connections.

    Signup and view all the flashcards

    Stateless firewall

    A firewall that treats each packet as independent, without considering ongoing connections.

    Signup and view all the flashcards

    Firewall misconfiguration

    A common cause of firewall failure, often due to rules being too strict or too lenient, potentially causing issues with network access.

    Signup and view all the flashcards

    RADIUS

    Remote Authentication Dial-In User Service; a protocol for authenticating users, often used for remote access.

    Signup and view all the flashcards

    Malware

    Malicious software designed to harm or intrude upon computer systems.

    Signup and view all the flashcards

    Virus

    A type of malware that replicates itself and infects more computers.

    Signup and view all the flashcards

    Trojan horse

    Malware that disguises itself as useful software but actually harms the system.

    Signup and view all the flashcards

    Business Continuity

    A company's ability to continue its operations with minimal disruption after a disaster or event.

    Signup and view all the flashcards

    Disaster Recovery Plan

    A detailed plan for restoring critical functionality and data after a significant disruption.

    Signup and view all the flashcards

    Cold Site

    A disaster recovery contingency with minimal infrastructure set up, requiring extensive configuration.

    Signup and view all the flashcards

    SNMP

    Simple Network Management Protocol; part of TCP/IP for managing network devices.

    Signup and view all the flashcards

    Firewall rule

    Instructions in a firewall that specify how to filter traffic.

    Signup and view all the flashcards

    Study Notes

    Intrusion Detection and Prevention Systems (IDS/IPS)

    • IDS (Intrusion Detection System) is a stand-alone device, application, or feature on a workstation, server, switch, router, or firewall.
    • It monitors network traffic to detect suspicious activity.
    • Two main detection methods: statistical anomaly detection and signature-based detection.
    • Implementations include:
      • HIDS (Host-based IDS): protects a single computer.
      • NIDS (Network-based IDS): protects a network, usually at the edge or DMZ.
    • IDS only detects and logs suspicious activity.
    • IPS (Intrusion Prevention System) actively reacts to alerts by preventing malicious traffic, based on the source IP address.
    • NIPS (Network-based Intrusion Prevention) protects entire networks.
    • HIPS (Host-based Intrusion Prevention) protects individual hosts.

    Proxy Servers

    • Proxy server acts as an intermediary between internal and external networks, screening traffic.
    • Manages security at the application layer.
    • Appears as an internal server to the outside world, but is a filtering device.
    • Prevents exposure of internal network addresses.
    • Reverse proxy provides services to external clients from internal servers, protecting internal servers.
    • Reverse proxies are useful for multiple web servers sharing a public IP address.
    • Forward and Reverse Proxies act as NAT (Network Address Translation) servers.
    • Forward proxy hides internal user IP addresses, while a reverse proxy responds to client requests for internal web servers.

    Firewalls

    • Firewall is a device or software that filters or blocks network traffic.
    • Can be placed between private networks (e.g., internal LANs) and a public network (e.g., internet).
    • Host-based firewalls only protect the computer they're installed on.
    • Packet-filtering firewall examines packet headers against Access Control Lists (ACLs) to allow or deny traffic based on criteria like IP addresses, ports, and protocol types.
    • Common criteria for filtering traffic: Source/destination IP addresses, Source/destination ports, TCP flags, UDP/ICMP protocols, packet sequence status, inbound/outbound status.
    • Stateful firewalls monitor existing traffic streams, while stateless firewalls examine each packet independently.
    • Firewall rules are similar to ACLs; ACL functions on a single interface.
    • Common cause of firewall failure is misconfiguration (too lenient or too strict rules).

    Remote Authentication Dial-In User Service (RADIUS)

    • RADIUS is a cross-platform, open-source application layer protocol used for user authentication.
    • Uses either UDP or TCP in the transport layer.
    • Can run on a remote access server or a dedicated RADIUS server.
    • Highly scalable, used for authenticating wireless, mobile, and remote users.
    • Often combined with other network services (e.g., proxies, VPNs) on a single machine.
    • Authentication port: 1812
    • Standard port: 1813

    DSL (Digital Subscriber Line)

    • DSL is a WAN connection method using the PSTN.
    • Supports multiple data and voice channels over a single line.
    • Requires repeaters for longer distances.
    • Distance to the central office (CO) affects throughput.
    • Uses advanced data modulation techniques (amplitude/phase modulation).
    • Faster than traditional dial-up modems.
    • Digital carrier, unlike analog dial-up modems.
    • xDSL refers to all DSL varieties (e.g., ADSL, VDSL, SDSL).

    Simple Network Management Protocol (SNMP)

    • SNMP is part of the TCP/IP suite.
    • Three versions: SNMP v1-3.
    • SNMPv1 is rarely used today.
    • SNMPv2 improved on SNMPv1 with better performance and a slightly better security.
    • SNMPv3 augments SNMPv2 with authentication, validation, and encryption.

    Malware

    • Malware is a program designed to intrude upon or harm a system or resources.
    • Types of malware: Viruses, Trojans, Worms, Bots, Ransomware
    • Virus: replicates itself to infect more computers
    • Trojan: disguises itself as useful but harms the system
    • Worm: runs independently and spreads between computers/networks
    • Bot: automatically runs without user intervention
    • Ransomware: locks user data or systems until a ransom is paid

    Business Continuity and Disaster Recovery

    • Business continuity is a company's ability to continue operations with minimal disruption.
    • Disaster recovery plan details processes for restoring critical functionality and data.
    • A disaster recovery plan should include contacts, backup frequency/location/methods/verification, network redundancy/agreements, strategies for testing, and crisis management.
    • Three categories of disaster recovery contingencies: cold site, warm site, hot site.
    • DRaaS (Disaster Recovery as a Service) is a cloud-based, scalable, inexpensive DR option.
    • PDU (Power Distribution Unit) is attached to a power source.
    • UPS (Uninterruptible Power Supply) is a battery-powered power source that prevents power fluctuations.
    • UPS categories: Standby UPS and Online UPS.
    • Backup is a copy of data or program files kept for archiving or safekeeping.
    • 3-2-1-1 Rule: 3 copies of data, 2 media types, 1 copy offsite, 1 offline copy. Factors affecting contingency plans and backup options include RTO (recovery time objective) and RPO (recovery point objective).

    Routers and Routing Protocols

    • Router connects two or more networks and passes packets from one network to another.
    • Router functions: connect dissimilar networks (LAN/WAN), interpret Layer 3 and often Layer 4 addressing, determine the best path, and reroute traffic if the primary path is down.
    • Router categories: Core/Interior routers (within AS), Edge/Border routers (between AS's), Exterior routers (out of organization's AS).
    • Routing protocols enable routers to communicate to find optimal paths.
    • Interior Gateway Protocols (IGPs) are used within Autonomous Systems (AS's) (e.g., RIP, OSPF, IS-IS, EIGRP).
    • Exterior Gateway Protocols (EGPs) facilitate routing outside of AS's (e.g., BGP).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the fundamentals of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), detailing their functions, types, and methods of detection. Additionally, it includes information about proxy servers and their role in network security. Test your knowledge on these critical components of network safety!

    More Like This

    Use Quizgecko on...
    Browser
    Browser