360 likes | 569 Views
Review. iClickers. Ch 1: The Importance of DNS Security. How many times have attackers brought down the RNS root?. Never 1 time 2 times 3-10 times More than ten times. Which technique allows larger DNS packets?. DoS Cache poisoning DNSChanger Packet amplification EDNS.
E N D
Review iClickers
How many times have attackers brought down the RNS root? • Never • 1 time • 2 times • 3-10 times • More than ten times
Which technique allows larger DNS packets? • DoS • Cache poisoning • DNSChanger • Packet amplification • EDNS
Which technique makes DoS attacks more effective? • DoS • Cache poisoning • DNSChanger • Packet amplification • EDNS
Which technique was used by the Kaminsky attack? • DoS • Cache poisoning • DNSChanger • Packet amplification • EDNS
Ch 2: DNS Overview: Protocol, Architecture, and Applications
Which item contains data for a domain and its subdomains? • /etc/hosts • FQDN • TLD • Zone • Delegation
Which item was used for name resolution before DNS? • /etc/hosts • FQDN • TLD • Zone • Delegation
In a home network, a router is used as a DNS server.What is its role? • Client • Caching Server • Resolver • Authoritative Server • None of the above
What item should be blocked on an SOA server? • Iterative query • Recursive query • Delegation • DNSSEC • TCP
Which record contains an email server's name? • A • AAAA • MX • PTR • CNAME
Which record is used to block spam? • RRSIG • DS • SPF • NAPTR • SOA
Which security problem makes your DNS server a hazard to others? • Single point of failure • Exposure of internal information • Open resolver • Unprotected zone transfers • Server running in privileged mode
Which security problem is caused by Microsoft products querying blackhole servers? • Single point of failure • Exposure of internal information • Open resolver • Unprotected zone transfers • Server running in privileged mode
Which security problem can be mitigated with source port randomization? • Predictable Transaction ID • CNAME chaining • Cache poisoning • MITM • Packet amplification
Which security problem can be mitigated with DNSSEC? • Predictable Transaction ID • CNAME chaining • Single point of failure • MITM • Packet amplification
Which monitoring technique requires a SPAN port? • Log data • Network flow data • Packet data • Application level metadata • None of the above
Which monitoring technique stores one record for each TCP or UDP session? • Log data • Network flow data • Packet data • Application level metadata • None of the above
Which monitoring technique contains layer 7 data in a convenient form? • Log data • Network flow data • Packet data • Application level metadata • None of the above
You see a lot of large DNS requests on your network, exceeding 300 bytes. What's going on? • Transient domains • Fast flux • Phantom domains • DNS Changer • Tunneling
Ch 5: Prevention, Protection and Mitigation of DNS Service Disruption
Which technique uses BGP to spread out attacks? • Geographically distributed • Network distributed • Caching acceleration • Anycast • Direct Delegation
Which technique requires you to trust another company, because if they go down, your site is down? • Geographically distributed • Network distributed • Caching acceleration • Anycast • Direct Delegation
Which device is used temporarily, only during an attack? • Failover • Firewall • IDS • IPS • Scrubber
Which entity has a self-signed DNSSEC key? • . • .org • ietf.org • More than one of the above • None of the above
Which protection does DNSSEC provide? • Confidentiality and integrity • Confidentiality and availability • Authenticity and availability • Authenticity and integrity • None of the above
What prevents MITM attacks in DNSSEC? • Trusted root • CA • Shared secret • Nothing • None of the above
Which item allows authenticated denial of existence, but exposes host names? • DS • NSEC • NSEC3 • RRSIG • Glue records
Which item conceals host names with hashing? • DS • NSEC • NSEC3 • RRSIG • Glue records
Which item renders DNS requests confidential? • DNSCurve • DNSSEC • NSEC3 • DS • RR
Which item makes attacks possible on the target's LAN? • DS Record • Lack of Protection Between User Devices and Resolvers • Lack of Protection of Glue Records • Key Changes Don't Propagate • NSEC3 DoS
Which attack is possible when a server changes hosting providers? • Re-Addressing Replay Attack • NSEC3 Offline Dictionary Attack • No Protection of DNS or Lower Layer Header Data • DNSSEC Data Inflate Zone Files and DNS Packet Sizes • DNSSEC Increases Computational Requirements