Note 6
Note 6
1. You are the IT manager of a company that provides laptop PCs to its sales
employees. You are concerned about the security implications. This is because
the sales staff can store sensitive data on their laptop PCs and then use them for
email. Identify TWO (2) risks to data on a laptop PC and briefly explain how each
risk can compromise the confidentiality, integrity or availability of the data.
2. You decide to address these security issues. State THREE (3) methods that you
can use to secure data on the PC and explain how each of your measures can
reduce the risk of a security breach.
4. Explain what is meant by the term password audit and briefly discuss why it is
important.
5. Explain what is meant by the term port scan and describe its role in a
vulnerability assessment and how the results should be used.
No – it is an attack.
No – it is a policy – a control.
9. Explain how you would detect open ports and provide ONE (1) example of a tool
that can be used.
A port scan connects to all 65536 ports on a server to see if services
are listening on them.
You may need to examine what port scanning software enters. nmap
is a popular free tool.
10. A further aspect of penetration testing is to use brute force attacks and dictionary
attacks. State THREE (3) similarities and TWO (2) differences between brute
force attacks and dictionary attacks.
Similarities:
Passwords can be obtained using any method.
Neither a dictionary attack nor a brute force attack is seeking for a
weakness or bypass; they are guessing attacks.
Both local and internet attacks are possible.
Differences:
Brute force tries every combination.
A dictionary attack is a guessing attack that uses a pre-compiled list.
Rather than attempting every possibility, only try the most likely
ones.
Faster but can't guarantee a solution.
11. The 3rd Annual Underground Hacker Markets Report (2016) from Dell shows
that ‘Hacking as a Service’ is now a major industry, with underground forums
offering hacked social media accounts for around US$60-100, Credit cards for
US$ 7-50 and DDoS attack for US$5 per hour, including a free 5–10-minute trial.
12. Explain how a DDoS attack occurs and briefly discuss its impact.
A server/website is overloaded.
Because of this, the machine becomes overworked.
Sent from a network of PCs that have been infected.
Denying access to valid service users.
13. Verizon suggest that one important way of dealing with DDoS is to “Have a solid
understanding of your DDoS mitigation service-level agreements”. Explain what
is meant by a “DDos mitigation service level agreement?”
17. What is the role of a port scan in a vulnerability assessment? Explain how the
results of a port scan should be used.
18. Penetration Testing aims to locate vulnerabilities in systems. One of the first
activities is to locate open ports. Explain what is meant by the term port and why
an open port can indicate a vulnerability.
20. There are many ways in which a system or network can be vulnerable. State the
FIVE (5) elements that can cause a vulnerability.
21. State TWO (2) tools that can be used by a system administrator to test for
vulnerabilities
Penetration testing
Vulnerability scanners.
22. Port scanners are used to report the status of ports. There are three possible
statuses. State TWO (2) tools that can be used by a system administrator to test
for vulnerabilities.
Nmap
Zenmap
23. A penetration test mimics the actions of a malicious attack on a network. The aim
is to discover the vulnerabilities that exist and that could be discovered by an
attacker. State the FOUR (4) pieces of information penetration testing can
provide.
25. Networks are vulnerable to many threats. Unauthorized access is the biggest
threat. Explain THREE (3) common causes of unauthorized access.
Software flaws.
Hardware failure.
Organization procedures.
Poor staff training.
No access controls.
26. Operating systems such as Windows, IOS and Linux are commonly used in most
industries and businesses. State TWO (2) reasons why using a common
operating system may make your network vulnerable.
27. As part of vulnerability prevention port scanning can be carried out to ensure that
ports are not left open, and therefore vulnerable to attack. There are many types
of port scanning. Most use TCP, however, UDP (User Datagram Protocol) Scans
are also used. Explain how a UDP Scan is carried out.
A penetration test looks like an attack on a network. The goal is to find out
what weaknesses there are and how an attacker could find them.
Systematic threats.
The effectiveness of the defensive systems in place.
Consequences of successful attacks.
Upgrade in security-related areas.
30. Briefly explain FOUR (4) types of vulnerability scanners used in penetration
testing.
Ports.
Networks.
Databases.
Web application.
Individual computers.