assessment worksheet attacking a virtual private...

2
Assessment Worksheet Attacking a Virtual Private Network Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview A properly configured Virtual Private Network that uses IPSec and adheres closely to best practices such as strong authentication, network segmentation, device validation, posture assessment, etc., is formidable, and protects all types of information while it is in transit from one location to the other. In this lab, you learned how to use social engineering techniques to unlock the secrets of a targeted individual or organization by attacking a Virtual Private Network. You also researched e-mail scams and used social engineering to create a believable spam e-mail to solicit funds for a fictitious fund-raising opportunity. Lab Assessment Questions & Answers 1. What is the darknet? a) An Internet for non-English speaking people b) The criminal side of the Internet c) An Internet just for law enforcement d) The old, IPv4 Internet that is being retired as IPv6 takes over e) None of the above 2. What e-mail protocol does Marina and Rita’s Cupcakes use and why is it important? 3. Text in an e-mail must match the URL to which it links. True or False? 4. Instead of relying just on a user ID and password systems, VPN access can be protected by tokens like SecurID and other ____________ methods.

Upload: ngobao

Post on 10-Apr-2018

219 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Assessment Worksheet Attacking a Virtual Private …d2jw81rkebrcvk.cloudfront.net/assets.navigate/issa/Assessment... · Assessment Worksheet Attacking a Virtual Private Network Course

Assessment Worksheet

Attacking a Virtual Private Network

Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________

Overview

A properly configured Virtual Private Network that uses IPSec and adheres closely to best practices such as strong authentication, network segmentation, device validation, posture assessment, etc., is formidable, and protects all types of information while it is in transit from one location to the other. In this lab, you learned how to use social engineering techniques to unlock the secrets of a targeted individual or organization by attacking a Virtual Private Network. You also researched e-mail scams and used social engineering to create a believable spam e-mail to solicit funds for a fictitious fund-raising opportunity.

Lab Assessment Questions & Answers

1. What is the darknet?

a) An Internet for non-English speaking people b) The criminal side of the Internet c) An Internet just for law enforcement d) The old, IPv4 Internet that is being retired as IPv6 takes over e) None of the above

2. What e-mail protocol does Marina and Rita’s Cupcakes use and why is it important?

3. Text in an e-mail must match the URL to which it links. True or False?

4. Instead of relying just on a user ID and password systems, VPN access can be

protected by tokens like SecurID and other ____________ methods.

Page 2: Assessment Worksheet Attacking a Virtual Private …d2jw81rkebrcvk.cloudfront.net/assets.navigate/issa/Assessment... · Assessment Worksheet Attacking a Virtual Private Network Course

2

5. In many instances an IP address is used to access a server rather than a URL because a URL is more difficult to set up and easier to track. True or False?

6. A well designed malicious e-mail campaign can expect ____________ number of responses, or click-throughs, as a legitimate commercial e-mail campaign.

a) fewer b) more c) about the same

7. Were Charlie Roberts and Susan Dougherty known to each other, and did they have a trust relationship that could be exploited?

8. Which of the following steps can make VPN access more secure?

a) Assure Perfect Forward Secrecy during IKE key exchange. b) Allow access only from specific MAC addresses. c) Allow access only from specific MAC/IP address pairs. d) Use foreign words as passwords. e) Change password letters to numbers, such as all Ls to 7s and all Os to 0s.