Final Exam Study Guide

Tuesday, May 15, 10:00-11:50am

Chapters covered

Before Midterm: Chapter 1-11. Use the midterm study guide for these chapters, found here: CISMidtermStudyGuide
After Midterm: 12, 18, 19, 21, 22, 23, 26, 30

Below are questions to study for these chapters:

Chapter 12:Cellular Network Security
  1. On the cellular network, what are cross-network services? Given an example of such a service. Why, in general, are these services available? What are the inherent risk of such services?
  2. On third generation cellular networks, how are each of the following attacks avoided:
    1. false base station attack
    2. Eavesdropping
  3. What is the SS7 protocol stack? What is the security risk it introduces? To what network?
  4. What are the three dimensions of attacks against teh cellular network? For each give two example of a specific type of attack.
Chapter 18: Intrusion Prevention and Detection Systems
  1. What is a 0-day exploit? What are the dangers? What are some techniques for addressing this danger?
  2. Explain each of the following in way the distinguish each from all the others:
    1. Virus
    2. Worm
    3. Backdoor
    4. Trojan horse
    5. User-level root kit
    6. Kernel-level root kit
    7. Blended malware
  3. What are the three modes of a network-based intrusion detection systems (NIDS)? What is a disadvantage and advantage of each?
  4. Explain the relative advantages of a host-based verses a network based IDS or IPS? Why might using both be advantages?
  5. What is a System integrity validation (SIV)? Why are they needed? How, in general, do they work?
Chapter 19: Computer Forensics
  1. What exactly is Computer Forensics?
  2. Why is there often a tension between ethics and efficiency in the process of doing Computer Forensics? Give an example.
  3. What is Database Reconstruction and why is it so difficult?
  4. What are the four type of evidence that are used in courts? Give an example of each that involve the use of digital or computer evidence.
  5. What is a write blocker? Why are they important?
Chapter 21: Firewalls
  1. What is service differentiation in a firewall. Give a specific example.
  2. When a packet enters a firewall what are tje possible operations that can be applied to the packet based on the firewall policy.
  3. In a firewall, what is a a first-match policy? Explain how it works.
  4. What are the main five values in a modern firewall rule? What is the
  5. What is a firewall default rule? Why are they used?
  6. What type of first match policy anomalies can happen in a firewall policy. Give two distinct examples.
  7. Whats is policy optimization? Why is it needed? What can be done, specifically, to optimize a set of rules in a policy?
  8. Explain how a default deny is different from a default accept.
  9. What is the difference between a packet filter and a stateful packet firewall? Give two specific and distinct examples of something a statefull firewall can filter that a simple packet filter would not be able to catch.
  10. What is a Application Layer Firewall? What can they do that a packet filter cannot do?
  11. What are the important difference between a network firewalls and a host firewall? Can both be used together? Why or why not?
  12. What is a Demilitarized Zone, and what is it's purpose. Give two distinct examples of how they are used.
  13. What is a perimeter network? What are they used? How can they be set up?
  14. Why have a two-router configuration? How and why is a proxy server used with such an architecture.
Chapter 22: Penetration Testing
  1. With respect to Penetration Testing, what is internal testing and external testing.
  2. Describe. comapare, and contrast white-box, gray-box, and black-box testing.
  3. List each phase of a penetration test. Describe what takes place in each phase.
  4. Why is there a need for "rules of engagement" in a penetration test? What are several examples of typical rules?
  5. What is the purpose of defining a methodology when planning a penetration test?
  6. Describe each of the following types of penetration testing in terms of what is done:
    1. Information Gathering
    2. Vulnerability Analysis
    3. External Penetration Testing
    4. Internal Network Penetration Testing
    5. Router Penetration Testing
    6. Firewall Penetration Testing
    7. IDS Penetration Testing
    8. Wireless Network Penetration Testing
    9. Denial-of-Service Penetration Testing
    10. Password-Cracking Penetration Testing
    11. Social Engineering Penetration Testing
    12. Stolen Laptop, PDA, and Cell Phone Penetration Testing
    13. Application Penetration Testing
    14. Physical Security Penetration Testing
    15. Database Penetration Testing
    16. Voice-Over-IP Penetration Testing
    17. VPN Penetration Testing
  7. What are five major liability issues with Penetration Testing.
  8. What is meant by a “Get Out of Jail Free” card?
Chapter 23: What Is Vulnerability Assessment?
  1. What are the major differences between penetration testing and vulnerability assessment.
  2. What are the steps of the Vulnerability mitigation cycle? Example each step.
  3. What are local or central scanning? What is the advantage of each.
  4. Whats is meant by Defense in depth? Name and describe at least of the possible layers.
  5. Name and describe at least five countermeasures a company can take to protect itself from being scanned by hackers.
  6. What is the difference and definitions of reactive and proactive security?
Chapter 26: Public Key Infrastructure
  1. A digital signature can help solve the problems of message integrity, authentication of sender, and non-repudiation.
    1. What does each of these mean?
    2. How is a digital signature used solve solve of each of these problems?
    3. How is it that a digital signature works that allows it to solve these problems?
  2. For PKI, a pair of keys must be generated
    1. Why a pair? What is each used for?
    2. Why must they be generated, why can't they be simply made up by the user?
  3. When you use the Internet to buy something with a credit card:
    1. What is the purpose of a certificate?
    2. Who issues the certificate?
    3. How can you check if a certificate is valid?
    4. What method is assure that a certificate has not been tampered with?
  4. What are the three steps involved in validating a certificate? Give the name, and a description, of each step.
Chapter 30: Virtual Private Networks
  1. What does it mean to say that a VPN creates a tunnel through the Internet? Explain how a tunnel works.
  2. SSH is a tunneling system used for VPN's. SSH uses a PKI to set up the tunnel, and uses symmetrical encryption to for data flowing through the tunnel.
    1. Why is PKI used for connection setup? Why not use symmetric encryption for this?
    2. Why is symmetric encryption used for data transmission? Why not use PKI for this?
VPN Penetration Testing

Edit | Attach | Print version | History: r6 < r5 < r4 < r3 < r2 | Backlinks | Raw View | Raw edit | More topic actions...
Topic revision: r4 - 2012-05-11 - JimSkon
 
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback