Chapter Review

Chapter Review

Technologies like the Internet, wireless connectivity, instant messaging, and others have introduced new levels of concern for network security. In addition to providing additional access points to the network, the Internet is also a reference resource for hackers and security experts. Unfortunately, no rules or limitations exist on the information that can be posted, so it’s easy for harmful information to be widely distributed.

The secure network design example is to lay a basic design foundation for discussions throughout the book. Basically, three types of networks are separated by a firewall device, which can be a router running firewall features, a server running firewall features, or a dedicated firewall device. The three types of networks are the following:

  • Inside Those trusted hosts and networks that make up the area to be protected.

  • Outside Those hosts and networks that pose a threat to the inside network. In many cases, the outside includes a perimeter router, the ISP, the Internet, and any networks attached to it.

  • DMZ A network of shared servers, or bastion hosts, that provide resources to both the outside network and the inside network users.

The firewall configuration allows relatively free access from the outside to the DMZ; access from the DMZ to the inside is limited to sessions originating inside; and access from the outside to the inside is generally blocked, except in rare well-protected exceptions.

The three most common weaknesses or vulnerabilities that cause network security problems include technology weaknesses, such as IP or OS holes; policy weaknesses, such as missing or weak security policies; and configuration weaknesses, such as insecure default settings.

The four primary threat designations are unstructured, structured, inside, and outside. These designations can be used in combinations like outside—unstructured to better define the type of attack.

The four most common attack types include reconnaissance attacks, access attacks, denial of service attacks, and data manipulation attacks. Many references, including the PIX Firewall exam, consider data manipulation attacks to be variations of access attacks.

Cisco Architecture for Voice, Video, and Integrated Data (AVVID) and SAFE are Cisco-comprehensive strategies that help organizations to successfully and securely develop and implement end-to-end network designs.

Questions

1.?

Which of the following is not a common cause of network security problems?

  1. Technology weakness

  2. Configuration weakness

  3. Planning weakness

  4. Policy weakness

C. Planning weakness

2.?

Which four of the following are primary types of network threats?

  1. Planned threats

  2. Unstructured threats

  3. External threats

  4. Structured threats

  5. Internal threats

B. Unstructured threats; C. External threats; D. Structured threats; and E. Internal threats

3.?

A virus is an example of which of the types of network threats?

  1. Planned threats

  2. Unstructured threats

  3. External threats

  4. Structured threats

  5. Internal threats

B. Unstructured threats

4.?

Which of the following is not one of the four primary types of network attack?

  1. Access attacks

  2. Data manipulation attacks

  3. Reconnaissance attacks

  4. Programmed attacks

  5. Denial of service attacks

D. Programmed attacks

5.?

In a reconnaissance attack, which one of the following is not a part of target discovery?

  1. Ping sweeps

  2. Ping of Death

  3. Port scans

  4. DNS queries

B. Ping of Death

6.?

Which one of the following is an example of social engineering relative to security?

  1. Guessing a password based on a person’s vanity license plate

  2. All users in a department using the same user name and password

  3. Giving your password to the home office technician, so they can test your account

  4. Using a password of eight characters, uppercase and lowercase, plus numbers

C. Giving your password to the home office technician so they can test your account. There is never a reason to give someone your password, or for a legitimate tech to ask for it.

7.?

A standard DoS attack typically includes which one of the following?

  1. An attacker, a series of Zombies, and the target

  2. An attacker, a war dialer, and the target

  3. An attacker, a series of Zombies, and the target

  4. An attacker and the target

D. An attacker and the target

8.?

Which of the following is not a well-known DoS attack?

  1. Ping of Death

  2. Tribe Flood Network

  3. Trinoo

  4. TCP SYN Flood

  5. Script kiddy

E. Script kiddy

9.?

IP spoofing is an example of which of the following?

  1. DoS attack

  2. Reconnaissance attacks

  3. Data manipulation attacks

  4. Brute force attack

C. Data manipulation attacks

10.?

RFC 2827 filtering refers to which of the following?

  1. Filtering private IP addresses

  2. Filtering based on trusted external addresses

  3. Filtering based on source addresses that belong on a network segment

  4. Filtering based on destination addresses that belong on a network segment

C. Filtering based on source addresses that belong on a network segment

11.?

Which of the following involves denying responsibility for a transaction?

  1. Session replay

  2. Rerouting

  3. Repudiation

  4. Session hijacking

C. Repudiation

12.?

Which of the following provides a standards-based network architecture and comprehensive set of best practices that allow businesses to develop business and technology strategies, which scale to meet the changing demands of e-business?

  1. SAFE

  2. DrDos

  3. AVVID

  4. Digital signatures

C. AVVID

13.?

RFC 1918 filtering refers to which of the following?

  1. Filtering private IP addresses

  2. Filtering based on trusted external addresses

  3. Filtering based on source addresses that belong on a network segment

  4. Filtering based on destination addresses that belong on a network segment

A. Filtering private IP addresses

14.?

Which of the following best describes a good security plan for an organization?

  1. Set it and forget it

  2. Ad hoc

  3. Evolutionary

  4. Rigid

C. Evolutionary

15.?

Which one of the following is not a part of the Cisco Security Wheel?

  1. Monitor

  2. Administer

  3. Test

  4. Secure

B. Administer

16.?

What is at the center of the Cisco Security Wheel?

  1. Strong network support staff

  2. Improvement

  3. Network security policy

  4. Flexibility

C. Network security policy

17.?

According to the “Site Security Handbook” (RFC 2196) a security policy is

  1. An informal set of suggestions by which people who are given access to an organization’s technology and information assets should abidB.

  2. A formal statement of the rules by which people who are given access to an organization’s technology and information assets must abidC.

  3. A formal statement of the rules by which network administrators can control access to an organization’s technology and information assets.

  4. RFC 2196 doesn’t deal with this issue.

B. A formal statement of the rules by which people who are given access to an organization s technology and information assets must abide

18.?

Which of the following is not a reason to create a network security policy?

  1. It provides a blueprint for security purchases and implementations.

  2. It defines technologies that can and cannot be added to the network.

  3. It provides the procedures to follow in case of a security incident.

  4. It frees up network security personnel to work on other projects.

  5. It provides a process and targets to audit existing security.

D. It frees up network security personnel to work on other projects.

19.?

Developing a security policy is often described as a balancing act. Which three of the following are common compromises that need to be made?

  1. Security cost versus risk of loss

  2. Security cost versus local or federal regulations

  3. Security versus ease of use

  4. Security versus services provided

  5. Local or federal regulations versus ease of use

A. Security cost versus risk of loss; C. Security versus ease of use; and D. Security versus services provided

20.?

When evaluating risk associated with a security breach, which three of the following might result from someone accessing the companies sales order entry system?

  1. Loss of reputation

  2. Loss of company data or intellectual property

  3. Loss of temper

  4. Loss of service

  5. Loss of privacy

A. Loss of reputation B. Loss of company data or intellectual property; and E. Loss of privacy; (While loss of temper might occur, this isn t one of the risk criteria.)

21.?

Which of the following might be included in an acceptable use policy (AUP)?

  1. Acceptable and unacceptable Internet activities

  2. Penalties or sanctions for violating the policy

  3. Acceptable and unacceptable e-mail activities

  4. Acceptable and unacceptable telephone use

  5. Acceptable and unacceptable copier or fax use

  6. All of the above

F. All of the above

22.?

Which of the following is likely to result in a security policy that will meet the needs of an organization?

  1. The network security staff develops the policy.

  2. The network security staff and network operations staff develop the policy.

  3. Representatives of all major groups that use and manage the networks, plus representatives of management develop the policD.

  4. The network security staff and company management develop the polic

C. Representatives of all major groups that use and manage the networks, plus representatives of management develop the policy.

23.?

In developing a security policy, as in any risk analysis, the first two things you must identify are the

  1. Opportunities

  2. Assets

  3. Hardships

  4. Threats

B. Assets and D. Threats

24.?

According to the RFC, which of the following is not a characteristic required of a good security policy?

  1. It must be implementable through network administration technologies, by publishing rules and acceptable use policies, or other appropriate methodB.

  2. It must clearly define the areas of responsibility for the users, administrators, and management. Maybe as important, it should clearly identify the limits of authority for each group under predictable circumstances.

  3. It must be state of the art, implementing all the latest, most advanced technologies and procedures to protect the company resources.

  4. It must be enforceable with security tools, where appropriate, and with sanctions, where actual prevention isn’t technically or financially feasible.

C. It must be state of the art implementing all of the latest and most advanced technologies and procedures to protect the company resources. (While a good idea, this might be far from cost-effective for many organizations.)

25.?

When a group of sales reps plug a wireless access point into a network jack so they can use wireless NICs on their laptop, they

  1. Greatly increase their mobility and freedom

  2. Increase the number of usable connections to the network

  3. Probably violate the wireless access policy of the security policy

  4. Add a hub that will reduce the bandwidth to each user

C. Probably violate the wireless access policy of the security policy (While all the statements are true, within the context of this course, this is the important issue.)

26.?

Which of the following statements best describes monitoring and auditing?

  1. They are two terms for the same process.

  2. Auditing is routine scheduled reviewing of security, while monitoring is random and unpredictable reviewing of securitC.

  3. Monitoring catches bad guys outside the network, while auditing catches bad guys inside the networD.

  4. Monitoring is routine scheduled reviewing of security, while auditing is a random and unpredictable reviewing of securit

D. Monitoring is routine scheduled reviewing of security, while auditing is a random and unpredictable reviewing of security.

Answers

1.?

C. Planning weakness

2.?

B. Unstructured threats; C. External threats; D. Structured threats; and E. Internal threats

3.?

B. Unstructured threats

4.?

D. Programmed attacks

5.?

B. Ping of Death

6.?

C. Giving your password to the home office technician so they can test your account. There is never a reason to give someone your password, or for a legitimate tech to ask for it.

7.?

D. An attacker and the target

8.?

E. Script kiddy

9.?

C. Data manipulation attacks

10.?

C. Filtering based on source addresses that belong on a network segment

11.?

C. Repudiation

12.?

C. AVVID

13.?

A. Filtering private IP addresses

14.?

C. Evolutionary

15.?

B. Administer

16.?

C. Network security policy

17.?

B. A formal statement of the rules by which people who are given access to an organization’s technology and information assets must abide

18.?

D. It frees up network security personnel to work on other projects.

19.?

A. Security cost versus risk of loss; C. Security versus ease of use; and D. Security versus services provided

20.?

A. Loss of reputation B. Loss of company data or intellectual property; and E. Loss of privacy; (While loss of temper might occur, this isn’t one of the risk criteria.)

21.?

F. All of the above

22.?

C. Representatives of all major groups that use and manage the networks, plus representatives of management develop the policy.

23.?

B. Assets and D. Threats

24.?

C. It must be state of the art implementing all of the latest and most advanced technologies and procedures to protect the company resources. (While a good idea, this might be far from cost-effective for many organizations.)

25.?

C. Probably violate the wireless access policy of the security policy (While all the statements are true, within the context of this course, this is the important issue.)

26.?

D. Monitoring is routine scheduled reviewing of security, while auditing is a random and unpredictable reviewing of security.




Part III: Virtual Private Networks (VPNs)