1. Why is normalizing log data important in a centralized logging setup?
Answers
· Log normalizing detects potential attacks.
· Uniformly formatted logs are easier to store and analyze.
· The data must be decrypted before sending it to the log server.
· It’s difficult to analyze abnormal logs.
2. What type of attacks does a flood guard protect against? Check all that apply.
Answers
· DDoS attacks
· SYN floods
· Man-in-the-middle attacks
· Malware infections
Explanation: A security system known as a flood guard is one that is intended to safeguard against a wide variety of flooding-related threats. It helps to prevent the system or network from being overloaded with an excessive amount of traffic or requests. The deployment of flood guards is an essential component of network security that must be carried out in order to guarantee the availability and dependability of services in the face of intentional flooding assaults.
3. What does DHCP Snooping protect against?
Answers
· DDoS attacks
· Rogue DHCP server attacks
· Brute-force attacks
· Data theft
Explanation: A network may be protected against malicious DHCP (Dynamic Host Configuration Protocol) servers by using a security feature called DHCP Snooping. Rogue DHCP servers may introduce vulnerabilities into a network by providing clients with network configuration information that is either inaccurate or malicious. This kind of attack may be avoided with the assistance of DHCP Snooping, which validates DHCP servers.
4. What does Dynamic ARP Inspection protect against?
Answers
· Malware infections
· ARP poisoning attacks
· Rogue DHCP server attacks
· DDoS attacks
Explanation: ARP (Address Resolution Protocol) spoofing attacks may be avoided with the use of a security feature known as Dynamic ARP Inspection, or DAI for short. Sending bogus ARP packets is part of the process known as ARP spoofing. This technique is used to disguise an attacker's MAC address by making it seem to come from the IP address of a valid network device. Validating ARP packets inside a network is one of the ways in which DAI contributes to the prevention of attacks of this kind.
5. What does IP Source Guard protect against?
Answers
· Brute-force attacks
· Rogue DHCP server attacks
· IP spoofing attacks
· DDoS attacks
Explanation: IP Source Guard is a feature of a security system that guards a network against assaults that include IP address spoofing. An attacker may conduct a variety of assaults against a network by using a technique known as IP address spoofing. This technique includes the attacker faking the source IP address of packets in order to trick the network. By guaranteeing that only legitimate and approved IP addresses are permitted on the network, IP Source Guard contributes to the prevention of assaults of this kind.
6. What does EAP-TLS use for mutual authentication of both the server and the client?
Answers
· Digital certificates
· Usernames and passwords
· One-time passwords
· Biometrics
Explanation: The Extensible Authentication Protocol with Transport Layer Security, often known as EAP-TLS, is a protocol that utilizes digital certificates for the purpose of performing mutual authentication between the client and the server.Because each party (server and client) owns a distinct certificate that is signed by a reliable certificate authority (CA), the usage of digital certificates in EAP-TLS offers a high degree of security for mutual authentication. This is because EAP-TLS makes use of digital certificates. This facilitates the establishment of a communication channel that is both safe and encrypted between the client and the server.
7. Why is it recommended to use both network-based and host-based firewalls? Check all that apply.
Answers
· For protection for mobile devices, like laptops
· For protection against man-in-the-middle attacks
· For protection against DDoS attacks
· For protection against compromised hosts on the same network
8. What are some weaknesses of the WEP scheme? Select all that apply.
Answers
· Its poor key generation methods
· Its small IV pool size
· Its use of ASCII characters for passphrases
· Its use of the RC4 stream cipher
Explanation: Because of these flaws, the WEP encryption protocol is regarded as being very unsafe, and its usage is severely discouraged. The weaknesses of the WEP security protocol have inspired the development of more recent Wi-Fi security protocols such as WPA (Wi-Fi Protected Access) and WPA2/WPA3, which together provide wireless networks a higher level of protection.
9. What symmetric encryption algorithm does WPA2 use?
Answers
· AES
· DSA
· DES
· RSA
Explanation: The Advanced Encryption Standard (AES) is the primary technique that is used for symmetric encryption in WPA2, also known as Wi-Fi Protected Access 2. In particular, the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is used by WPA2 in order to ensure both the secrecy and integrity of transmitted data.
The Advanced Encryption Standard (AES) is a symmetric encryption algorithm that is well renowned for its high level of security. The incorporation of AES into WPA2 increases the overall security of Wi-Fi networks by providing strong encryption for wireless communications. It took the place of the Temporal Key Integrity Protocol (TKIP), which was used in the first version of WPA (Wi-Fi Protected Access) and was considered to be less secure. When compared to its predecessors, the usage of AES-CCMP in WPA2 is seen as a substantial enhancement in terms of the level of security it provides.
10. How can you reduce the likelihood of WPS brute-force attacks? Check all that apply.
Answers
· Use a very long and complex passphrase.
· Update firewall rules.
· Implement lockout periods for incorrect attempts.
· Disable WPS.
Explanation: Implementing security measures to defend against unauthorized efforts to guess or break the WPS PIN is one way to reduce the possibility of WPS (Wi-Fi Protected Setup) brute-force attacks. This is done as part of the process of reducing the risk of WPS (Wi-Fi Protected Setup) brute-force attacks. The use of a combination of these security measures improves the safety of WPS and lowers the likelihood that an unsuccessful brute-force attack would be attempted.
11. Select the most secure WiFi security configuration from below:
Answers
· WPA enterprise
· WPA2 personal
· WEP 128 bit
· WPA personal
· None
· WPA2 enterprise
12. What process authenticates clients to a network?
Answers
· WPA2
· HMAC-SHA1
· TKIP
· Four-way handshake
13. What does tcpdump do? Select all that apply.
Answers
· Analyzes packets and provides a textual analysis
· Captures packets
· Generates packets
· Encrypts your packets
Explanation: Tcpdump is a sophisticated tool that is often used by developers, network administrators, and security experts for the purpose of debugging, monitoring, and analyzing network traffic. During the process of gathering and analyzing network traffic, it provides flexibility and granularity.
14. What does wireshark do differently from tcpdump? Check all that apply.
Answers
· It can capture packets and analyze them.
· It understands more application-level protocols.
· It has a graphical interface.
· It can write packet captures to a file.
Explanation: Wireshark has a graphical user interface, which enables users to visually view recorded packets in an approach that is friendlier to newcomers to the software. Tcpdump, on the other hand, is an application that is run from the command line and does not have a graphical user interface.
The display of packets in Wireshark is colorized, which makes it much simpler to identify between the several protocols and packet kinds. The readability of the various sorts of packets is improved by the use of colors that are distinct from one another. Tcpdump presents data in a simple text format without any colorization of the packets it examines.
15. What factors should you consider when designing an IDS installation? Check all that apply.
Answers
· Internet connection speed
· Traffic bandwidth
· OS types in use
· Storage capacity
Explanation: In order to guarantee that an Intrusion Detection System (IDS) installation is designed properly and can effectively identify and react to security occurrences, considerable attention has to be given to a variety of elements throughout the design process.
It is important to have a solid understanding of the organization's network topology, which includes the positioning of vital resources, subnets, and network segments. Determine the locations where to strategically put IDS sensors in order to monitor the relevant traffic.
Conduct an investigation on the kinds of network traffic that should be anticipated in the setting, including the typical patterns and protocols. Having this insight is beneficial when it comes to establishing proper detection rules and thresholds.
Determine which essential assets and systems need more monitoring and protection, then rank them in order of importance. Put the emphasis of your intrusion detection system (IDS) on the places that would suffer the greatest damage in the event of a security breach.
16. What is the difference between an Intrusion Detection System and an Intrusion Prevention System?
Answers
· An IDS can actively block attack traffic, while an IPS can only alert on detected attack traffic.
· An IDS can alert on detected attack traffic, but an IPS can actively block attack traffic.
· An IDS can detect malware activity on a network, but an IPS can’t
· They are the same thing.
Explanation: Both an Intrusion Detection System, also known as an IDS, and an Intrusion Prevention System, also known as an IPS, are examples of cybersecurity technologies that are intended to prevent intrusions.
17. What factors would limit your ability to capture packets? Check all that apply.
Answers
· Network interface not being in promiscuous or monitor mode
· Anti-malware software
· Encryption
· Access to the traffic in question
18. What does tcpdump do?
Answers
· Handles packet injection
· Brute forces password databases
· Generates DDoS attack traffic
· Performs packet capture and analysis
Explanation: Oh, the tcpdump tool! It's like having access to the networking version of Sherlock Holmes. On a network, it actively searches for and seizes data packets. You may use it to examine what's occurring in the data stream, solve issues, or simply satisfy your natural interest about it.
19. What can protect your network from DoS attacks?
Answers
· DHCP Snooping
· Dynamic ARP Inspection
· Flood Guard
· IP Source Guard
20. What occurs after a Network Intrusion Detection System (NIDS) first detects an attack?
Answers
· Triggers alerts
· Shuts down
· Blocks traffic
· Disables network access
21. What does a Network Intrusion Prevention System (NIPS) do when it detects an attack?
Answers
· It blocks the traffic.
· It does nothing.
· It triggers an alert.
· It attacks back.
Explanation: In its most basic form, NIPS is concerned not only with detecting intrusions but also with actively preventing such intrusions from inflicting damage. It is the watchdog of the digital sphere, keeping constant vigilance and standing ready to repel any attacks from the internet.
22. How do you protect against rogue DHCP server attacks?
Answers
· IP Source Guard
· Flood Guard
· Dynamic ARP Inspection
· DHCP Snooping
Explanation: This is analogous to having reliable court attendants who keep an eye on which DHCP servers are authorized to distribute content to clients. Your network switches should have DHCP snooping enabled so that they will only let DHCP answers to come from authorized servers.
23. What underlying symmetric encryption cipher does WEP use?
Answers
· RSA
· AES
· RC4
· DES
Explanation: The Wired Equivalent Privacy protocol, often known as WEP, employs the RC4 stream cipher as its underlying symmetric encryption method. This protocol is no longer used since it is seen to be unsafe and has become outdated. The RC4 stream cipher is a symmetric key stream cipher, which means that it encrypts and decrypts data using the same key.
However, it is essential to keep in mind that WEP is riddled with substantial security flaws, and thus, its use in contemporary Wi-Fi networks is not encouraged. Its encryption may be cracked with relative ease, and as a result, more secure solutions such as WPA (Wi-Fi Protected Access) and WPA2 have been created to compensate for these flaws.
24. What traffic would an implicit deny firewall rule block?
Answers
· Outbound traffic only
· Nothing unless blocked
· Everything that is not explicitly permitted or allowed
· Inbound traffic only
Explanation: The implicit refuse rule in a firewall is sometimes referred to as "the silent guardian." It acts as an unsung hero that, by default, prevents traffic from being permitted unless it is specifically approved. If a firewall contains an implicit deny rule at the very end of its rule set, then it will prevent any traffic that does not meet any of the explicit allow rules that came before it from passing through.
To put it another way, it's the same as telling someone, "Unless I've specifically said you can come in, you're not getting past the gate." Therefore, the implicit deny rule will cause the firewall to reject any traffic that does not comply with the requirements specified in the rules for the firewall. It provides an additional degree of protection to ensure that only authorized traffic passes through the area.
25. What allows you to take all packets from a specified port, port range, or an entire VLAN and mirror the packets to a specified switch port?
Answers
· DHCP Snooping
· Promiscuous Mode
· Network hub
· Port Mirroring
Explanation: Oh, you're referring about port mirroring or the Switched Port Analyzer, right? It's just like having a closed-circuit television camera monitoring the traffic on your network! You can duplicate or mirror the packets that are sent from a particular port, port range, or even an entire VLAN by using port mirroring and sending them to another switch port that has been specifically selected.
When doing network analysis, monitoring, or troubleshooting, this comes in helpful. It would be the same as having a copy of all the letters written and received in the kingdom forwarded to a hidden room for review.
To configure port mirroring, you will normally need to visit the settings of your switch and choose the source (the location from which you want to copy the packets) and the destination (the location to which you want to transmit the mirrored packets).
It is a strong tool that network managers may use to maintain a vigilant check on the traffic without interfering with the usual data flow.
26. What kind of attack does IP Source Guard (IPSG) protect against?
Answers
· IP Spoofing attacks
· DoS attacks
· ARP Man-in-the-middle attacks
· Rogue DHCP Server attacks
Explanation: IP Source Guard (IPSG) operates like a watchful guard tasked with defending the kingdom from the introduction of imposter messengers. It protects especially against attacks that involve impersonating IP addresses.
When conducting an attack using IP address spoofing, hostile actors would intentionally falsify the source IP address of their packets to trick the network. It is the same as mailing letters to people with a fictitious return address to deceive them. IPSG contributes to preventing this issue by checking to see if the IP addresses included inside the incoming packets on a network are identical to the allowed IP addresses connected to the particular ports.
IPSG helps to protect the network's integrity by acting in this manner, which prevents potential attackers from pretending to be someone else on the network. To protect the integrity of the network and guarantee that data packets are only accepted from trusted origins, this critical layer of protection is essential.
27. What can be configured to allow secure remote connections to web applications without requiring a VPN?
Answers
· Reverse proxy
· RC4
· NIDS
· Web browser
Explanation: Make it mandatory for all of your online apps to utilize HTTPS. SSL/TLS protocols give an extra degree of security by encrypting the data that is sent between the user's device and the web server. This helps to avoid eavesdropping. Put in place multi-factor authentication for an additional degree of protection. To access the online apps, users would need more than simply a password. Typically, users would require a combination of something they know (passw