CNIT 455 Exam I

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/209

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

210 Terms

1
New cards

T/F A Packet Filter is hardware that limits connectivity

F (Software)

2
New cards

Packet filters block _______ and ______ traffic

ingress, egress

3
New cards

Packet filters use ____ based filtering

rule

4
New cards

Packet filter rules are combined into ________

rulesets

5
New cards

T/F A good practice with packet filters is to allow what you want then deny all else.

T

6
New cards

A firewall always includes a ______ ______

packet filter

7
New cards

T/F All packet filters are firewalls

F (Firewalls contain packet filters, not vice versa)

8
New cards

T/F Windows firewall, iptables, and pfsense are examples of software "firewalls"

T

9
New cards

T/F Packet filters are often used as a replacement in the IP stack on modern implementations.

F (uncommon)

10
New cards

T/F Packet filters are often implemented as a specialized network device.

T

11
New cards

One should always use __ rather than ___ when configuring a packet filter, as the latter is far easier to spoof.

IP, DNS

12
New cards

When filtering by IP, one should control access based on the ______/__________ IP address.

source/destination

13
New cards

T/F Packet filters are vulnerable to IP address spoofing via ARP.

T

14
New cards

LSRR stands for

Loose Source Record Routing

15
New cards

T/F LSRR tells packets specific routes to gain access to otherwise unreachable networks.

T

16
New cards

T/F LSRR prevents machines from spoofing addresses.

F (Enables spoofing, as net traffic can still find the machine)

17
New cards

T/F You should always enable LSRR on border routers and firewalls

F (DISABLE IT)

18
New cards

UDP and TCP communication is based on numbered _____

ports

19
New cards

T/F UDP and TCP source and destination ports are standardized.

F (only destination)

20
New cards

UDP and TCP ______ ports are chosen randomly, from port ____ and above

source, 1024

21
New cards

The two types of port filtering are ______ and ________

Static, dynamic

22
New cards

Static port filtering involves only allowing traffic based on ____ number or IP/____ number combination

port

23
New cards

In static port filtering, each packet is checked _____________

independently

24
New cards

Dynamic port filtering is also known as ________ ______ __________

stateful packet inspection

25
New cards

Dynamic port filtering checks the _______ of the packet as well as ______ and ___________ addresses

context, source, destination

26
New cards

T/F Destination Static Port Filtering involves examining and filtering based on source port number

F (destination you dip)

27
New cards

The major limitation of Destination Static Port Filtering is that it only works if a server responds to incoming messages on the _________ ____

receiving port

28
New cards

In source static port forwarding, source ports are typically randomly chosen from numbers above ____

1023

29
New cards

In source static port forwarding, after a server sends a message using a random port > 1023, the return traffic will be _______ by the firewall.

blocked

30
New cards

To work around the blocking caused by SSPF, you must ______ incoming traffic for ports > 1023

allow

31
New cards

T/F Allowing traffic for SSPF is a massive security problem.

T

32
New cards

By monitoring the source port for ingress traffic in SSPF, you have created a __-__________ static filter

bi-directional

33
New cards

TCP Static Source Port Filtering consists of performing a check on the ___ bit of outgoing TCP traffic

ACK

34
New cards

TCP SSPF does not work for flows that dynamically open ________ connections, such as FTP or H.323

Multiple

35
New cards

UDP source packet filtering can be done by denying ___ traffic

UDP

36
New cards

T/F UDP SPSF is essentially impossible due to the reliance on DNS

T

37
New cards

To solve the inherent problem with DNS in UDP SPSF, one can use DNS _________ and limit IP addresses to your upstream DNS server

forwarding

38
New cards

In _______ packet filtering, ports are closed until they are needed.

Dynamic

39
New cards

Dynamic Packet Filtering builds a _____ _____ of information about communications

state table

40
New cards

T/F The state table in DPF keeps track of sequence numbers of TCP packets and UDP data flows.

T

41
New cards

T/F Dynamic Packet Filtering cannot perform authentication upon session startup

F (it can)

42
New cards

T/F Dynamic packet filtering can examine the application layer to ensure the traffic is what it says it is.

T

43
New cards

The three things that can be done when a filter blocks traffic are:

1. Send ICMP host not reachable

2. Send ICMP host not administratively reachable

3. Send _______

Nothing

44
New cards

The safest solution when deciding to block traffic is to send ______

Nothing

45
New cards

The primary strength of a packet filter is how ____ it is

fast

46
New cards

T/F A packet filter can approach line speeds.

T

47
New cards

T/F Packet filters log everything that passes through them.

F (Too much data to collect)

48
New cards

T/F Packet filters are fully capable of perfectly authenticating all traffic passing through

F (very limited authentication)

49
New cards

T/F Once you allow traffic to pass through a filter, it likely cannot be tracked.

T

50
New cards

T/F Always ensure Loose Source Record Routing is disabled.

T

51
New cards

T/F Best practice is to send an ICMP host not reachable message when a packet is blocked by a firewall.

F (Send nothing)

52
New cards

T/F A properly configured packet filter is immune to IP address spoofing

F (Not immune)

53
New cards

T/F All modern packet filters implement stateful (dynamic) packet inspection

T

54
New cards

T/F Your mail server is delivering a message to an external address. The source port address will be TCP 25.

F (The source address will be randomly chosen from a value of 1024 or higher, up to 2^16)

55
New cards

T/F Stateful packet inspection is another term for application layer gateway.

F (Stateful packet inspection is a filtering method. As such packets are delivered from the source to the destination. An application layer gateway breaks the data flow into two separate sessions: one between the target and the ALG and one from the requester and the ALG)

56
New cards

T/F To simplify writing packet filter rules you should use DNS domain names instead of IP addresses.

F

57
New cards

T/F The biggest disadvantage of packet filtering is that a direct connection is made between the source and destination hosts.

T

58
New cards

T/F Using UDP static filtering and allowing outgoing connections effectively opens up all non-reserved UDP ports for incoming traffic.

T

59
New cards

IPsec adds security to the IPv4 or IPv6 ________ layer

network

60
New cards

IPsec reduces the need for __________ layer security

Application

61
New cards

T/F IPsec can provide a layer of security to inherently insecure application layer protocols.

T

62
New cards

IPsec runs at a ___ layer of the operating system

low

63
New cards

T/F IPsec does not support filtering

F (it does)

64
New cards

T/F IPsec will filter all traffic across the network at all times.

F (some traffic is handled natively by IP/TCP/UDP, etc)

65
New cards

The two modes of IPsec operation are __________ and ______

Transport, Tunnel

66
New cards

The two protocols utilized in IPsec are the ____________ _______ protocol, and the ____________ _______ _______.

Authentication Header, Encapsulating Security Payload

67
New cards

T/F IPsec AH and ESP can be used simultaneously.

T

68
New cards

T/F The authentication header can be used for encryption of network traffic.

F (only authentication)

69
New cards

T/F Both transport and tunnel mode can work with AH and ESP.

T

70
New cards

Transport mode is used to secure any layer _ or above protocol set.

4

71
New cards

T/F Transport mode can be used with virtually all application layer protocols

T

72
New cards

T/F IPsec does not require the communication endpoint to be the cryptographic endpoint.

F (comm endpoint must be cryptographic endpoint)

73
New cards

Transport mode is used to protect standard application layer data during transmission across an _______ network.

insecure

74
New cards

T/F Tunnel mode requires an entire IP packet to be encapsulated into the IPsec data field.

T

75
New cards

Tunnel mode is utilized for the creation of ___ connections.

VPN

76
New cards

Authentication Header protocol was established with RFC ____.

4301

77
New cards

AH in included in IP Protocol __.

51

78
New cards

AH provides authentication of the entire IPv4 _______

datagram

79
New cards

AH ensures a packet is not _______ or _______.

spoofed, munged

80
New cards

T/F Authentication Headers provide an anti-replay service with optional sequence numbers.

T

81
New cards

T/F Even when using Authentication Headers, the source address could be spoofed.

F (theoretically the source address cannot be spoofed)

82
New cards

Authentication Headers doe not ______ data.

encrypt

83
New cards

Encapsulating Security Payload is included in RFC ____, ____ et. al.

2460, 4303

84
New cards

ESP is included in IP Protocol __

50

85
New cards

ESP provides for ___________ and/or _________

authentication, encryption

86
New cards

T/F ESP allows implementation of authentication and encryption, but neither have to be enabled when configuring IPsec.

F (one must be specified, otherwise why enable it to begin with)

87
New cards

IPsec supports many block ciphers using ______ _____ _______ (CBC)

Cipher Block Chaining

88
New cards

An IPsec ________ defines the set of cryptographic tools used by IPsec

transform

89
New cards

PIX/ASA implementations of IPsec refer to crypto tools as _______ ____

transform sets

90
New cards

In cryptography, a _______ __________ is a one way set of security information used to facilitate a logical connection between nodes

security association

91
New cards

___ security associations are required for duplex communication.

two

92
New cards

A Security Association contains cryptographic information, including __________, _________ information, and ___ information

authenticators, Encryption, MAC

93
New cards

T/F Before two nodes can communicate securely, they must sort out their security associations

T

94
New cards

Transforms that can be performed in IPsec include ___/__, ______ with key, and ___ with key

ESP/AH, Cipher, MAC

95
New cards

Both nodes must agree on the _______ of interest

traffic

96
New cards

T/F Both nodes must agree on the path MTU.

T

97
New cards

The _______ ________ _____ is a unique 32 bit value identifying each individual data flow.

Security Parameter Index

98
New cards

T/F IPsec security associations are usually manually configured

F (Rarely done, as it is less secure than automatic)

99
New cards

IPsec security associations are configured automatically via a ___ _______ ______

key exchange protocol

100
New cards

ISAKMP stands for

Internet Security Association Key management protocol