What is the vulnerability of SNMP?

What is the vulnerability of SNMP?



Answer: Version 1 and Version 2 pass management information and community strings (passwords) in clear text


What are the 14 general security policies that an organization may invoke?

What are the 14 general security policies that an organization may invoke?



(1) Statement of Authority and Scope (2) Acceptable Use Policy (AUP) (3) Identification and Authentication Policy (4) Internet Access Policy (5) Campus Access Policy (6) Remote Access Policy

(7) Incident Handling Procedure (8) Account Access Request Policy (9) Acquisition Assessment Policy (10) Audit Policy (11) Information Sensitivity Policy (12) Password Policy (13) Risk Assessment Policy (14) Global Web Server Policy


A comprehensive security policy has what 4 characteristics?

A comprehensive security policy has what 4 characteristics?


Answer: (1) Protects people and information (2) Sets the rules for expected behavior by users, system administrators, management and security personnel (3)Authorizes security personnel to monitor, probe and investigate (4) Defines and authorizes the consequences of violations


A security policy benefits an organization in what 7 ways?

A security policy benefits an organization in what 7 ways?



Answer: (1) Provides a means to audit existing network security and compare the requirements to what is in place. (2) Plan security improvements, including equipment, software, and procedures. (3) Defines the roles and responsibilities of the company executives, administrators, and users (4) Defines which behavior is and is not allowed (5) Defines a process for handling network security incidents (6) Creates a basis for legal action if necessary (7) Enables global security implementation and enforcement by acting as a standard between sites.

What part of the network security wheel is defined as the information collected from the monitoring and testing phases, IDSs can be used to develop and implement improvement mechanisms that augment the security policy and results in adding items to step 1

What part of the network security wheel is defined as the information collected from the monitoring and testing phases, IDSs can be used to develop and implement improvement mechanisms that augment the security policy and results in adding items to step 1



Answer: Improve

What 4 factors does the security policy include?

What 4 factors does the security policy include?



Answer: (1) Identifies the security objectives of the organization (2) Documents the resources to be protected (3) Identifies the network infrastructure with current maps and inventories (4) Identifies the critical resources that need to be protected (risk analysis)


What are the three building blocks that are apart of the integrated approach to security appliances and applications?

What are the three building blocks that are apart of the integrated approach to security appliances and applications?



Answer: (1) Threat Control (1a) Regulates network access, isolates infected systems, prevents intrusions and protects assets by counteracting malicious traffic such as viruses and worms. (2) Secure Communications (2a) Secures network endpoints with VPN (3) Network Admission Control (NAC) (3a) Provides a roles-based method of preventing unauthorized access to a network


How are agents typically installed?

How are agents typically installed?



Answer: On publicly accessible servers and corporate mail and application servers. Agent reports events to a central console server located inside the corporate firewall. As an alternative, agents on the host can send logs as e-mail to an administrator


What is an inline technology; it stops the attack, prevents damage and blocks the propagation of worms and viruses and can be set to shut down the network connection or to stop impacted services automatically. Corrective action can be taken immediately

What is an inline technology; it stops the attack, prevents damage and blocks the propagation of worms and viruses and can be set to shut down the network connection or to stop impacted services automatically. Corrective action can be taken immediately



Answer: Host-Based Intrusion Prevention System (HIPS)

What is a solution to the problem of downloading security updates and patching vulnerable systems with uncontrolled systems in a local network or systems remotely connected via VPN and RAS

What is a solution to the problem of downloading security updates and patching vulnerable systems with uncontrolled systems in a local network or systems remotely connected via VPN and RAS



Answer: Create a central Patch Server that all systems must communicate with after a set period of time


What part of the worm anatomy is classified as when once a host is infected with a worm, the attacker has access to the host, often as a privileged user. Attackers could use a local exploit to escalate their privilege level to administrator

What part of the worm anatomy is classified as when once a host is infected with a worm, the attacker has access to the host, often as a privileged user. Attackers could use a local exploit to escalate their privilege level to administrator



Answer: Payload

What part of the worm anatomy is classified as when the worm installs itself by exploiting known vulnerabilities in systems, such as naïve end users who open unverified executable attachments in e-mails

What part of the worm anatomy is classified as when the worm installs itself by exploiting known vulnerabilities in systems, such as naïve end users who open unverified executable attachments in e-mails



Answer: The Enabling Vulnerability

What type of attack is to compromise a trusted host, using it to stage attacks on other hosts in a network.If a host in a network of a company is protected by a firewall (inside host), but is accessible to a trusted host outside the firewall (outside host), the inside host can be attacked through the trusted outside host.

What type of attack is to compromise a trusted host, using it to stage attacks on other hosts in a network.If a host in a network of a company is protected by a firewall (inside host), but is accessible to a trusted host outside the firewall (outside host), the inside host can be attacked through the trusted outside host.



Answer: Trust Exploitation

What are threats that consist of come from individuals or groups that are more highly motivated and technically competent. They break into business computers to commit fraud, destroy or alter records, or simply to create havoc

What are threats that consist of come from individuals or groups that are more highly motivated and technically competent. They break into business computers to commit fraud, destroy or alter records, or simply to create havoc



Answer: structured threats

What 5 things can you do to prevent electrical damage?

What 5 things can you do to prevent electrical damage?



(1) Install UPS systems (2) Install generate sets (3) Fallow a preventative maintenance plan (4) Install redundant power supplies (5) Perform remote alarming and monitoring


What 3 things can you do to prevent hardware damage?

What 3 things can you do to prevent hardware damage?



(1) Lock up Equipment to prevent unauthorized access from the doors, ceiling, raised floor, etc (2) Monitor and control closet entry with electronic logs (3) Use security cameras


What are five examples of security policy weaknesses?

What are five examples of security policy weaknesses?



(1) Lack of written security policy (2) Politics (3) Lack of Continuity (4) Logical access controls not applied (5) Software and hardware installation and changed do not follow policy (6) Disaster recovery plan is nonexistent