Module 1 – TCP/IP Framework
Introduction to the TCP/IP Protocol Framework
- if the packet belongs to an open session
- the source IP address ✔
- the destination port ✔
- the service or protocol used ✔
- the destination IP address ✔
Yes but not on the same packet. A decision is made which type of inspection will be most effective on a packet-by-packet bases.
- Yes, the stateless inspection is conducted first and then a stateful inspection is done. ✔
- No, the latency created by a double inspection is too great to be practical.
- No, stateless and stateful firewalls are distinctly different and used for different purposes.
- True
- False ✔
- An IP address to a physical address and vice versa.
- A MAC address to an IP address and vice versa.
- A private network IP address to a public network IP address and vice versa. ✔
- An IP address to a domain name and vice versa.
- Dynamic
- Kinetic
- Overload
- Static ✔
Network Protocols Over Ethernet and Local Area Networks
1. Which network layer do IP addresses belong to?- The Physical Layer
- The Network Layer ✔
- The Data Link Layer
- The Application Layer
- The IP Address ✔
- The MAC address.
- The DHCP Address
- The DNS Address
- Unidirectional
- Monoplex
- Half duplex
- Full duplex ✔
- True
- False ✔
- Full-duplex transmission.
- End-user devices share bandwidth on each port. ✔
- Virtual LANs are possible.
- Each port is dedicated to a single device; bandwidth is not shared.
- Virtual LANs are not possible. ✔
- Half-duplex transmission. ✔
- True
- False ✔
Basics of Routing and Switching, Network Packets and Structures
- 4 ✔
- 2
- 1
- 0
- True ✔
- False
- ARP looks up the address in the ARP Table.
- ARP drops the packet as undeliverable.
- ARP sends the message to the MAC address of the default gateway. ✔
- ARP sends a message to the destination IP address asking for its MAC address.
- Only on routers, switches, and hubs.
- On any network connected device. ✔
- Only on routers and network gateways.
- Only on routers.
- It translates IP addresses to MAC addresses and vice versa.
- It manages all network traffic.
- It forwards messages coming from, or going to, external networks. ✔
- It manages network traffic on the local subnet only.
- Static
- Default
- Direct ✔
- Dynamic
TCP/IP Framework
- It is a packet-by-packet inspection with no awareness of previous packets. ✔
- It is the inspection of packets by non-state actors, such as private telecom companies.
- It is the inspection of a packet’s source and destination IP addresses only.
- It is the inspection of a packet’s service or protocols used only.
- True ✔
- False
- True ✔
- False
- Intrusion Detection System (IDS). ✔
- Intrusion Prevention System (IPS).
- By blocking traffic from known malware sites.
- By hiding the real IP addresses of all the devices on your private network and exposing only a single public IP address. ✔
- By requiring a certificate exchange to authenticate the source of external IP addresses before allowing them through the firewall.
- By assigning a different false IP address to traffic leaving your network and translating it back to the real internal IP addresses on incoming traffic.
- Dynamic
- Kinetic
- Static
- Overload ✔
- The Data Link Layer. ✔
- The Physical Layer.
- The Application Layer.
- The Network Layer.
- The Gateway address.
- The IP address.
- The DNS address.
- The MAC address. ✔
- Full duplex
- Unidirectional
- Monoplex
- Half duplex ✔
- It returns the packet to the sender with a delivery error message.
- It forwards the packet to the correct address if it is in the same network or the gateway if it is not.
- It discards the packet. ✔
- It reads the contents of the packet.
- True
- False ✔
- To translate a MAC address to an IP address and vice versa. ✔
- To translate a logical address to an IP address and vice versa.
- To translate a physical address to an IP address and vice versa.
- To translate a gateway address to an IP address and vice versa.
- It drops the packet as undeliverable.
- It forwards the packet to the default gateway. ✔
- It sends out a broadcast message looking for the correct system to reply with a confirmation message.
- It returns the packet to the sender to deal with.
- Messages sent to other computers on the same subnet will not be delivered but those destined to computers on other networks will be delivered.
- Messages sent to other computers on the same subnet and those destined to computers on other networks will be delivered.
- Messages sent to other computers on the same subnet will be delivered but those destined to computers on other networks will not be delivered. ✔
- No messages will be delivered.
Module 2 – Basic of IP Addressing and the OSI Model
Basics of IP Addressing
- 3
- 5 ✔
- 9
- 1
- They form a total of 8 subranges.
- This was the eighth version of the IP address range to be adopted by the Internet Standards Committee (and the first to gain widespread acceptance.)
- The inventor noted the similarity to the “octives” in piano music.
- The number 255 in decimal takes up 8 digits in binary. ✔
- 0
- 1
- 2
- 3 ✔
- True ✔
- False
- True
- False ✔
- 255.255.255.0
- 255.0.0.0 ✔
- 255.255.255.255
- 0.0.0.0
- Many billions of times as many possible IP addresses. ✔
- Four times as many possible IP addresses.
- The same number of possible IP addresses, but expressed with greater precision.
- The same number of possible host addresses but many more network addresses.
- Unicast
- Broadcast
- Simulcast
- Multicast ✔
TCP/IP Layer 4, Transport Layer Overview
- True ✔
- False
2. True or False: The UDP transport protocol is faster than the TCP transport protocol.
- True ✔
- False
3. Which four (4) of these are characteristic of the UDP transport protocol?
- Ordered data; duplicate detection
- Unreliable ✔
- Connection-oriented
- Flow control
- Unordered data; duplicates possible ✔
- Reliable
- Connectionless ✔
- No flow control ✔
TCP/IP Layer 5, Application Layer Overview
- To convert MAC addresses to domain names and vice versa.
- To translate domain names to IP addresses and vice versa. ✔
- To filter out domains not authorized access to the local network.
- To assign domain names to new endpoints.
- The endpoint sends an inquiry to the gateway and the gateway responds with the address of the DHCP server.
- The DHCP server is always located on the gateway.
- The endpoint sends a DHCP Discover broadcast request to all endpoints on the local network. ✔
- The administrator must input the IP address of the DHCP server in the endpoint’s network configuration.
- Syslog Application
- Syslog Content ✔
- Syslog Message
- Syslog Transport
- True ✔
- False
- True ✔
- False
- To provide a stream of all data entering or leaving a specific port for debugging or analysis work. ✔
- To make the network faster by providing two parallel ports through which data can flow.
- To make the network more reliable by providing a redundant path for all traffic destined for a specific port.
- To provide an independent data stream for when two processes must operate on the same incoming data.
Firewalls, Intrusion Detection and Intrusion Prevention Systems
- NGFW do essentially the same thing as traditional firewalls but can handle substantially more network traffic per firewall.
- NGFW use sessions.
- NGFW inspect both TCP and UDP traffic while traditional firewalls inspect TCP traffic only. ✔
- NGFW inspect all 7 network layers.
- True ✔
- False
- Layer interleave-based detection.
- Signature-based detection. ✔
- Statistical anomaly-based detection. ✔
- Transport layer variance detection.
- You would have to block all social media access from your network.
- You would have to block any IP addresses used by Facebook. ✔
- You would have to block all HTTP traffic from entering or leaving your network.
- Specific sites cannot be blocked using a traditional firewall.
Clustering and High Availability Systems
1. Which condition should apply in order to achieve effective clustering and failover among your firewalls?- The firewall hardware should be identical.
- The firewall operating systems should be identical.
- There should be direct connections between the primary and secondary nodes.
- All of the above. ✔
Basics of IP Addressing and the OSI Model
- 10000
- 01010
- 01111 ✔
- 01001
- 0
- 3
- 2
- 1 ✔
- The host mask.
- The network separation filter.
- The address filter.
- The subnet mask. ✔
The number of delivery attempts that may be made before the packet is returned to the source address as undeliverable.
- The number of seconds a packet may live if not delivered.
- The number of minutes a packet may live if it is not delivered.
- The number of Layer 3 devices (hubs, routers, etc.) the packet is allowed to pass through before it is dropped. ✔
- 192.168.52
- 24
- 168.52.3
- 3 ✔
- 255.255.255.255
- 255.0.0.0
- 0.0.0.0
- 255.255.255.0 ✔
- Unicast
- Multicast
- Simulcast
- Broadcast ✔
- Broadcast
- Multicast ✔
- Unicast ✔
- Anycast ✔
- True
- False ✔
- Source Port ✔
- Source IP Address
- Destination IP Address
- Destination Port ✔
- Unreliable
- Connection-oriented ✔
- Connectionless
- Ordered data; duplicate detection ✔
- Flow control ✔
- Reliable ✔
- The endpoint sends out a DNS Discover broadcast request to all endpoints on the local network.
- The endpoint sends an inquiry to the gateway and the gateway responds with the address of the DNS server.
- It is manually configured in the network settings by the administrator or obtained from the DHCP server. ✔
- The DNS server is always located on the gateway.
- To translate domain names to IP addresses and vice versa.
- To collect host names present on a local network segment.
- To automatically assign IP addresses to systems. ✔
- To automatically assign MAC addresses to systems.
- Syslog Application ✔
- Syslog Content
- Syslog Message
- Syslog Transport
- Packet count and byte count.
- Source and destination TCP/UDP ports.
- Source and destination IP addresses.
- Routing and peering data such as TCP flags and protocol.
- All of the above. ✔
- The NIC sends out one false, or “promiscuous” packet for every legitimate packet it sends to interfere with eavesdropping operations.
- The NIC forwards promiscuous packets to the Promiscuous Server.
- The NIC sends all packets to the CPU for processing instead of only those packets indicated for its MAC address. ✔
- The NIC filters out dangerous or “promiscuous” packets.
- Subsequent packets of the same session are automatically allowed. ✔
- Subsequent packets that arrive within the Session Interval configured for that firewall will be allowed to pass without inspection. The first packet that arrives after the session interval expires will trigger the creation of a new session.
- Every packet is inspected and allowed or denied based upon the same firewall rules that applied to the first packet.
- The subsequent packets are inspected based on session-specific rules, not the packet-specific rules that were used to inspect the first packet in the session.
- No serious consequence, application-level inspection and blocking can be configured. ✔
- You would have to block all social media access from your network.
- You would have to block all access to Facebook from your network.
- You would have to block all HTTP traffic from entering or leaving your network.
- Signature-based detection
- Statistical anomaly-based detection ✔
- Traffic Variance Analysis
- Traffic Impact Analysis
- Redundancy ✔
- Independence
- Failover ✔
- Geographically dispersed
- Monitoring ✔
Module 3 – Introduction to Databases
Types of Data
- True
- False ✔
- Data warehouses ✔
- Big data databases
- Distributed databases ✔
- File Shares
- Raw data
- Structured data
- Unstructured data
- Semi-structured data ✔
- Tables are organized in a hierarchical manner so Table 2 always follows Table 1 and so forth.
- Through the use of primary and foreign keys. ✔
- Table connection diagrams are defined in the database configuration settings.
- By adding a pointer as the last field of each record in a table that points to the first field in the next table.
Securing Databases
- Blocking & Quarantine
- Activity Monitoring
- Discovery & Classification ✔
- Vulnerability Assessment ✔
- Entitlements Reporting ✔
- Federal Bureau of Investigation (FBI)
- Central Intelligence Agency (CIA)
- Department of Defense (DoD) ✔
- Center for Internet Security (CIS)
- The client and the application.
- The database and the hardened data repository. ✔
- The database administrator and the database.
- The application and the database.
- True
- False ✔
- PaaS
- On Premises ✔
- SaaS
- IaaS
- Discover, Monitor & Protect, Harden, Repeat
- Discover, Harden, Monitor & Protect, Repeat ✔
- Harden, Discover, Monitor & Protect, Repeat
- Monitor & Protect, Discover, Harden, Repeat
A Data Protection Solution Example, IBM Security Guardium Use
Cases
- To exclude certain commands from being executed.
- To exclude individual accounts from accessing data.
- To exclude certain applications or safe activities from being logged. ✔
- To exclude someone from accessing certain database tables.
- True
- False ✔
- All standard reports are considered auditable.
- Develop a custom report and turn on Audit Locking to assure the results cannot be tampered with.
- Use the Audit Process Builder feature to automate the reporting process. ✔
- Export standard access logs to Excel or another reporting tool for sorting and processing.
- True ✔
- False
- When the activity took place. ✔
- Which database tables were associated with the activity.
- Who or what committed the activity. ✔
- Whether the attempted activity was completed successfully.
- What activity took place. ✔
- True
- False ✔
- A known user attempts to run invalid SQL statements against data his ID is authorized to access.
- A user routinely enters the incorrect password once or twice before entering the correct password for his account.
- Data accessed by an accounting application dramatically increases in the last few days of every month.
- Attempts are made to access data using nonstandard tools, such as MS Excel or MS Access, rather than through the application the data belongs to. ✔
- owner. ✔
- An authorized user attempts to run SQL statements with invalid syntax.
- Use of an Application ID from a hostname that is different from what has been specified by the application owner. ✔
- It takes an authorized user 3 attempts to enter the correct password.
Introduction to Databases
- Data models
- Database types
- Data source types ✔
- Data center types
- Data warehouses
- Big data databases ✔
- Distributed databases
- File Shares
- Structureless data
- Semi-structured data
- Unstructured data
- Structured data ✔
- All the data in a relational database is stored in a single table.
- All the data in a flat file database is stored in a single table. ✔
- Flat file databases consist of a table that references internally stored files.
- Flat file databases consist of a table that references externally stored files.
- Common Vulnerability and Exposures (CVE).
- Center for Internet Security (CIS). ✔
- Department of Defense/Defence Information Systems Agency (DoD/DISA).
- Central Intelligence Agency (CIA).
- Through an application. ✔
- Through a database client.
- Directly from a hardened repository.
- Directly from a database.
- True ✔
- False
- Structured data is associated with metadata, while unstructured data relies on specialized repositories such as databases.
- Structured data is harder to access and process than unstructured data.
- Structured data is data organized into a formatted repository, making it easily addressable, whereas unstructured data lacks any form of organization. ✔
- Structured data is the least organized and hardest to understand, while unstructured data is the most formatted.
- Real-time Monitor & Protection, Identification & Baseline, Raise the Bar
- Identification & Baseline,Real-time Monitor & Protection, Raise the Bar
- Identification & Baseline, Raise the Bar, Real-time Monitor & Protection ✔
- Raise the Bar, Identification & Baseline, Real-time Monitor & Protection
- An Aggregator rule.
- An Access rule. ✔
- An Exception rule.
- An Exclude rule.
- True ✔
- False
- True
- False ✔
- True ✔
- False
- A known user attempts to run invalid SQL statements against data his ID is authorized to access.
- Data accessed by an accounting application dramatically increases in the last few days of every month.
- A user routinely enters the incorrect password once or twice before entering the correct password for his account.
- Attempts are made to SELECT lists of usernames and passwords by a non-administrator account. ✔
Module 4 – Deep Dive – Injection Vulnerability
Injection Vulnerability
- Linux
- Windows
- MacOS
- All operating systems are susceptible. ✔
- It makes it more difficult for a hacker to inject additional commands or arguments.
- Powershell.exe is resistant to OS Injection attacks but sh, bash and cmd.exe have no built-in security.
- It makes it easier for a hacker to inject additional commands or arguments. ✔
- True ✔
- False
- True
- False ✔
5. True or False: Safe coding practice uses library functions when running OS commands.
- True ✔
- False
- True
- False ✔
SQL Injection
- Blind injection
- Error-based ✔
- UNION-based
- Out of Band
- True ✔
- False
- True ✔
- False
- True
- False ✔
Software Vulnerabilities
- An attacker uses a web application to send a browser-side script to another user.
- An attacker sends more data to a web application than the memory buffer can handle.
- An attacker uploads a file to a web application without proper validation. ✔
- An attacker places malicious code into an SQL statement through a web page.
- Click the History tab in the Information window.
- Click the Quick Start tab in the Workspace window.
- Expand Sites in the Tree window. ✔
- Select ATTACK Mode from the list of modes.
- Clone the project.
- Fork the repository.
- Issue a pull request. ✔
- Merge your code with the repository.
- Integrations > Vulnerability management > Vulcan
- Projects > itsarepo > buggycode.yaml > Settings icon > GitHub integration
- Projects > itsarepo > buggycode.yaml > Issues ✔
- Integrations > GitHub > itsarepo > buggycode.py
Deep Dive – Injection Vulnerability
- Improperly configured security settings in the MySQL database.
- Poor user input sanitation and unsafe execution of OS commands. ✔
- Vulnerabilities in the operating system shell interpreter.
- Vulnerabilities in the operating system kernel.
- Avoid using DLL libraries in commercial applications where security is a concern.
- Write-protect the folders that contain your libraries.
- Always use explicit paths to the commands or library applications. ✔
- Use only hijack resistant open-source libraries whenever possible.
- True ✔
- False
- True
- False ✔
- True ✔
- False
- UNION-based
- Blind injection
- Error-based
- Out of Band ✔
- True
- False ✔
- Direct use of native operating system commands.
- Showing users the exact nature of database input errors.
- Direct SQL execution from user input values.
- Use of stored procedures. ✔
- It will have no impact on the risk of an injection attack.
- It will eliminate the injection attack surface.
- It will increase the risk of an injection attack.
- It will reduce, but not eliminate, the injection attack surface. ✔
- Security monitoring
- System information event management
- Dynamic application security testing
- Penetration testing ✔
- Click the Request tab in the Workspace window.
- Expand Sites in the Tree window.
- Select Protected Mode from the list of modes.
- Click the Alerts tab in the Information window. ✔
- Access your list of GitHub repositories, and then click Projects.
- Access the repository’s web page, and then click Pull requests.
- Access the repository’s web page, and then click Fork. ✔
- Access your list of GitHub repositories, and then click Sort.
- Click Ignore, click Not vulnerable, type a comment in the comment field, and then click Save.
- Click Ignore, click Ignore permanently, and then click Save.
- Click Ignore, click Ignore temporarily, select the Until fix is available checkbox, and then click Save. ✔
- Click Ignore, click Not vulnerable, and then click Save.