Network Monitoring
More Network Monitoring
Vulnerabilities and Threats
IP Services
IP & Enterprise Services
100

What are the monitoring tools that forward captured network traffic to network monitoring devices?

A network tap is used to capture traffic for monitoring the network. The tap is typically a passive splitting device implemented inline on the network and forwards all traffic including physical layer errors to an analysis device. 

SPAN is a port mirroring technology supported on Cisco switches that enables the switch to copy frames and forward them to an analysis device.

100

What is FTP?

What is SFTP?

FTP is an unsecure network protocol. Anyone capturing packets can obtain the username and password from the capture. 

A more secure protocol such as SFTP should be used.


100

How does IPv6 carry optional network layer info?

IPv6 uses extension headers to carry optional network layer information. Extension headers are not part of the main IPv6 header but are separate headers placed between the IPv6 header and the payload.


100

What is shadowing?


Two threats to DNS are DNS shadowing and DNS tunneling attacks. DNS shadowing attacks compromise a parent domain and then the cybercriminal creates subdomains to be used in attacks. 

100

What is SQL injection?

A criminal can insert a malicious SQL statement in an entry field on a website where the system does not filter the user input correctly.


200

What is Port Mirroring?

When enabled on a switch, port mirroring copies frames sent and received by the switch and forwards them to another port, which has a analysis device attached.


200

What is SNMP?

What does is do?

The Simple Network Management Protocol is used by network devices to send and log messages to a syslog server in order to monitor traffic and network device events.

200

What is a DDos attack?

DDoS is a distributed denial-of-services attack. A DDoS attack is launched from multiple coordinated sources. The sources of the attack are zombie hosts that the cybercriminal has built into a botnet. When ready, the cybercriminal instructs the botnet of zombies to attack the chosen target.

200

What is a Tunneling attack?

DNS tunneling attacks build botnets to bypass traditional security solutions. Three threats to DNS open resolvers are cache poisoning, amplification and reflection, and resource utilization attacks.

200

What is a resource utilization attack?


When the attacker sends multiple packets that consume server resources.


300

What does SPAN do?

When enabled on a switch, SPAN or port mirroring, copies frames that are sent and received by the switch and forwards them to another port, known as a Switch Port Analyzer port, which has a analysis device attached.

300

How does Wireshark save it's files?

Wireshark captures are saved as PCAP files, which contain frame, interface, and packet information, and also time stamps.


300

What is a SYN flood attack?

In a TCP SYN flood attack, the attacker sends to the target host a continuous flood of TCP SYN session requests with a spoofed source IP address. The target host responds with a TCP-SYN-ACK to each of the SYN session requests and waits for a TCP ACK that will never arrive. Eventually the target is overwhelmed with half-open TCP connections.

300

How does a man-in-the-middle attack work?


A cybercriminal could set up a rogue DHCP server that provides one or more of the following:

Wrong default gateway that is used to create a man-in-the-middle attack and allow the attacker to intercept data

Wrong DNS server that results in the user being sent to a malicious website

Invalid default gateway IP address that results in a denial of service attack on the DHCP client

300

What is a amplification and reflection attack?

When the attacker uses open resolvers to increase the volume of attacks and mask the true source of the attack


400

What is SIEM?

Name a paid for and opensource SIEM tool.


Security Information Event Management (SIEM) is a technology used in enterprise organizations to provide real time reporting and long-term analysis of security events.

SIEM includes the following essential functions:
Forensic analysis, Correlation, Aggregation, Reporting

SIEM Tools:

Splunk - Paid
ELK - OPen Source

400

What is Gobbler?

Gobbler: A tool to audit DHCP networks

Includes DHCP rogue server detection, DHCP DoS, distributed spoofed port scanner using DHCP to obtain many source IP addresses, mulitple arp scans, filtered port detection, spoofed OS detection (nmap + port 0)

400

How do you mask a DNS attack?

Fast flux, double IP flux, and domain generation algorithms are used by cybercrimals to attack DNS servers and affect DNS services. Fast flux is a technique used to hide phishing and malware delivery sites behind a quickly-changing network of compromised DNS hosts (bots within botnets). The double IP flux technique rapidly changes the hostname to IP address mappings and the authoritative name server. Domain generation algorithms randomly generate domain names to be used as rendezvous points.

400

What does a passive and active ARP poisoning attack do?


ARP poisoning attacks can be passive or active. The result of a passive attack is that cybercriminals steal confidential information. With an active attack, cybercriminals modify data in transit or they inject malicious data.


400

How is a iFrame used in an attack?

An HTML element known as an inline frame or iFrame allows the browser to load a different web page from another source.

Hackers can use this to make a site load a bad site or page that is full of malicious code.

500

What is Netflow?

NetFlow is a Cisco technology that provides statistics on packets flowing through a Cisco router or multilayer switch.

500

What is StealthWatch?


Cisco Stealthwatch is the most comprehensive visibility and network traffic security analytics solution that uses enterprise telemetry from the existing network infrastructure. It provides advanced threat detection, accelerated threat response, and simplified network segmentation using multilayer machine learning and entity modeling. With advanced behavioral analytics, you’ll always know who is on your network and what they are doing.

500

What is DHCP starvation?

DCHP starvation attacks are launched by an attacker with the intent to create a DoS for DHCP clients. To accomplish this goal, the attacker uses a tool that sends many DHCPDISCOVER messages in order to lease the entire pool of available IP addresses, thus denying them to legitimate hosts.

500

How does a DNS cache poisoning attack work?


In a DNS cache poisoning attack, falsified information is used to redirect users from legitimate to malicious internet sites.


500

What is a cushioning attack?

The HTTP 302 cushioning attack is used by cybercriminals to take advantage of the 302 Found HTTP response status code to redirect the browser of the user to a new location, usually a malicious site.


M
e
n
u