Endpoint Protection & Detection
Question 1
Question 2
Question 3
Question 4
Explanation
Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource. MFA requires means of verification that unauthorized users won’t have.
Proper multi-factor authentication uses factors from at least two different categories.
MFA methods:
+ Knowledge – usually a password – is the most commonly used tool in MFA solutions. However, despite their simplicity, passwords have become a security problem and slow down productivity.
+ Physical factors – also called possession factors–use tokens, such as a USB dongle or a portable device, that generate a temporary QR (quick response) code. Mobile phones are commonly used, as they have the advantage of being readily available in most situations.
+ Inherent – This category includes biometrics like fingerprint, face, and retina scans. As technology advances, it may also include voice ID or other behavioral inputs like keystroke metrics. Because inherent factors are reliably unique, always present, and secure, this category shows promise.
+ Location-based and time-based – Authentication systems can use GPS coordinates, network parameters, and metadata for the network in use, and device recognition for MFA. Adaptive authentication combines these data points with historical or contextual user data.
A time factor in conjunction with a location factor could detect an attacker attempting to authenticate in Europe when the user was last authenticated in California an hour prior, for example.
+ Time-based one-time password (TOTP) – This is generally used in 2FA but could apply to any MFA method where a second step is introduced dynamically at login upon completing a first step. The wait for a second step–in which temporary passcodes are sent by SMS or email–is usually brief, and the process is easy to use for a wide range of users and devices. This method is currently widely used.
+ Social media – In this case a user grants permission for a website to use their social media username and password for login. This provide an easy login process, and one generally available to all users.
+ Risk-based authentication – Sometimes called adaptive multi-factor authentication, this method combines adaptive authentication and algorithms that calculate risk and observe the context of specific login requests. The goal of this method is to reduce redundant logins and provide a more user-friendly workflow.
+ Push-based 2FA – Push-based 2FA improves on SMS and TOTP 2FA by adding additional layers of security while improving ease of use. It confirms a user’s identity with multiple factors of authentication that other methods cannot. Because push-based 2FA sends notifications through data networks like cellular or Wi-Fi, users must have data access on their mobile devices to use the 2FA functionality.
Reference: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.html
The two most popular authentication factors are knowledge and inherent (including biometrics like fingerprint, face, and retina scans. Biometrics is used commonly in mobile devices).
Question 5
Explanation
Authentication based on usernames and passwords alone is unreliable and unwieldy, since users may have trouble storing, remembering, and managing them across multiple accounts, and many reuse passwords across services and create passwords that lack complexity. Passwords also offer weak security because of the ease of acquiring them through hacking, phishing, and malware.
Note: In fact multifactor authentication (MFA) can help prevent man-in-the-middle as the hacker does not have the OTP code to log in. But from the link above, “phishing” is the answer Cisco wanted.
Question 6
Question 7
Explanation
Cisco ISE can determine the type of device or endpoint connecting to the network by performing “profiling.” Profiling is done by using DHCP, SNMP, Span, NetFlow, HTTP, RADIUS, DNS, or NMAP scans to collect as much metadata as possible to learn the device fingerprint.
NMAP (“Network Mapper”) is a popular network scanner which provides a lot of features. One of them is the OUI (Organizationally Unique Identifier) information. OUI is the first 24 bit or 6 hexadecimal value of the MAC address.
Note: DHCP probe cannot collect OUIs of endpoints. NMAP scan probe can collect these endpoint attributes:
+ EndPointPolicy
+ LastNmapScanCount
+ NmapScanCount
+ OUI
+ Operating-system
Reference: http://www.network-node.com/blog/2016/1/2/ise-20-profiling
Question 8
Explanation
Two-factor authentication adds a second layer of security to your online accounts. Verifying your identity using a second factor (like your phone or other mobile device) prevents anyone but you from logging in, even if they know your password.
Note: Single sign-on (SSO) is a property of identity and access management that enables users to securely authenticate with multiple applications and websites by logging in only once with just one set of credentials (username and password). With SSO, the application or website that the user is trying to access relies on a trusted third party to verify that users are who they say they are.
Q7: why is it NMAP and not DHCP?
Yeah you can argue OUI is present in the DHCP Probe attributes as well , but DHCP Probe doesn’t then use the OUI for automatic endpoint profiling …
My opinion is DHCP was thrown in there for confusion because :
1) keyword “OUI” provided after DHCP Probe’s “dhcp-client-identifier” correlates MAC addresses to OUIs from corresponding mapping table, but that’s it.
2) DHCP(IP Binding) probe is indeed essential for NMAP probe to be effective (it populates IP&MAC info in the Internal Endpoints DB which NMAP Probe then grabs OUI from).
Reading question carefully again and with a glance over ISE Profiling , you’ll notice ISE NMAP Probe will be the one doing the automatic endpoint assignment , by having a device PROFILE created (“SPECIFIC” OUI used to detect device type in this scenario) which NMAP Scan can then use , so that any endpoint matching this profile could then be added to its own group automatically (NMAPscan does it for you).
Q8 should be B and D? Please advice
Q4. Shouldnt it be B and D?
According to this DUO documentation
https://duo.com/product/multi-factor-authentication-mfa/two-factor-authentication-2fa
Q8 – all answers can be correct, depends on Duo license. Duo MFA is a base subscription, if it is a part of the question, I would say A,D,C,D are correct. for E more advance subscription is requred.
Q7.
In ISE Radius and DHCP probes are enabled by default but this question does not say ISE It just says engineer. NMAP probes can also be run from the FMC Network Discovery tool.
My 2 cents
Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
A. phishing
B. brute force X
C. man-in-the-middle X
D. DDOS
E. teardrop
—–How on earth would 2FA protect you against MITM?
Correct answer is Brute force and Phishing:
https://duo.com/product/multi-factor-authentication-mfa/two-factor-authentication-2fa
2FA protects against phishing, social engineering and password brute-force attacks and secures your logins from attackers exploiting weak or stolen credentials.
Q5 Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
agree w/ Steve
The costs of hacking and phishing attacks can be high. Because MFA helps secure systems against unauthorized users–and their associated threats–the organization is more secure overall.
Ref: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.html#~benefits
Q5 if we think about it the other way around, MITM cannot see both factors of Auth, because one of them is delivered out-of-band (sms or biometric factor) .. However if he can stay in the middle he can get access to the user account, and eventually be able to make changes ..
@securitytut
Q5 is wrong:
Question 5 – Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
A. phishing
B. brute force
Those are the real answers.
It can be validated here:
https://duo.com/product/multi-factor-authentication-mfa/two-factor-authentication-2fa
and here:
https://www.cisco.com/c/en_uk/solutions/small-business/webinars/how-to-prevent-cyber-attacks.html