Chapter 3
A1: | c |
A2: | c |
A3: | d |
A4: | e |
A5: | a,d |
A6: | b,e |
A7: | a,d |
A8: | c |
A9: | c |
A10: | b,c |
Q&A
1: | What are some of the benefits of using a dedicated appliance for security rather than the same integrated functionality in another device? |
A1: | Some of the benefits of using a dedicated appliance for security are that appliances tend to provide greater depth of functionality as well as provide for a hardened system. Although the cost is greater, the flexibility achieved through dedicated appliances is also significantly greater. |
2: | What are the two significant advantages to SAFE's use of modules in the blueprint? |
A2: | The SAFE design philosophy is achieved through the use of modules. This approach has two significant advantages:
|
3: | What is the primary method that a DDoS attack uses to achieve its effects? |
A3: | The goal of a DDoS attack is to shut down an entire network rather than one particular host, and the primary method that is used to achieve this is to consume all the bandwidth going to and from the network. One possible side effect of a DDoS attack is that a target system on the network crashes. |
4: | Why do hosts represent the greatest risk on a network? |
A4: | Hosts represent the greatest risk on a network because of the large number of different hardware platforms, operating systems, and applicationseach with its own set of patches and updatesand their high visibility. Hosts represent the lowest-hanging fruit on a network and are the target of choice for an attacker. |
5: | Is it important to lock down Telnet, web, or SNMP access to devices, and if so, why? |
A5: | It is important to lock down all access to devices. Attackers can use Telnet access to gain access to the CLI of devices and possibly to privileged EXEC mode. The username and password of a Telnet session is passed in the clear on a network, exposing it to anyone who may be sniffing the network. If an attacker gains access to the privileged EXEC mode on devices, they can make configuration changes. Web and SNMP access should also be locked down for the same reason. |
6: | What is the role of VTP in a network? What could an attacker do with VTP? How can attacks using VTP be made less likely to succeed? |
A6: | VTP is used to communicate VLAN information from a VTP server to clients. The information transmitted relates to the configured VLANs on the network. If attackers can spoof or forge VTP advertisements, they may be able to do a variety of things, such as delete VLAN information or even create new VLANs. To make such an attack less likely to succeed, the administrator needs to use VTP password authentication to authenticate VTP advertisements. |
7: | What is 802.1x? How can it be used to improve the security of a network? |
A7: | The IEEE standard 802.1x was developed originally for switches on wired networks but has been more widely deployed in conjunction with wireless networks. In brief, 802.1x requires authentication of a client to a network. If the authentication succeeds, the access point or switch then allows traffic to pass through. Otherwise, the user cannot connect to network resources, such as DHCP and DNS, or any other services. |
8: | What are the four factors a software audit should consider when determining the security of an application? |
A8: | Software audits should analyze several areas when determining the security of an application:
|
