Home > Endpoint Protection & Detection

Endpoint Protection & Detection

September 4th, 2020 Go to comments

Question 1

Question 2

Question 3

Question 4

Explanation

Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource. MFA requires means of verification that unauthorized users won’t have.

Proper multi-factor authentication uses factors from at least two different categories.

MFA methods:

+ Knowledge – usually a password – is the most commonly used tool in MFA solutions. However, despite their simplicity, passwords have become a security problem and slow down productivity.
+ Physical factors – also called possession factors–use tokens, such as a USB dongle or a portable device, that generate a temporary QR (quick response) code. Mobile phones are commonly used, as they have the advantage of being readily available in most situations.
+ Inherent – This category includes biometrics like fingerprint, face, and retina scans. As technology advances, it may also include voice ID or other behavioral inputs like keystroke metrics. Because inherent factors are reliably unique, always present, and secure, this category shows promise.
+ Location-based and time-based – Authentication systems can use GPS coordinates, network parameters, and metadata for the network in use, and device recognition for MFA. Adaptive authentication combines these data points with historical or contextual user data.

A time factor in conjunction with a location factor could detect an attacker attempting to authenticate in Europe when the user was last authenticated in California an hour prior, for example.

+ Time-based one-time password (TOTP) – This is generally used in 2FA but could apply to any MFA method where a second step is introduced dynamically at login upon completing a first step. The wait for a second step–in which temporary passcodes are sent by SMS or email–is usually brief, and the process is easy to use for a wide range of users and devices. This method is currently widely used.
+ Social media – In this case a user grants permission for a website to use their social media username and password for login. This provide an easy login process, and one generally available to all users.
+ Risk-based authentication – Sometimes called adaptive multi-factor authentication, this method combines adaptive authentication and algorithms that calculate risk and observe the context of specific login requests. The goal of this method is to reduce redundant logins and provide a more user-friendly workflow.
+ Push-based 2FA – Push-based 2FA improves on SMS and TOTP 2FA by adding additional layers of security while improving ease of use. It confirms a user’s identity with multiple factors of authentication that other methods cannot. Because push-based 2FA sends notifications through data networks like cellular or Wi-Fi, users must have data access on their mobile devices to use the 2FA functionality.

Reference: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.html

The two most popular authentication factors are knowledge and inherent (including biometrics like fingerprint, face, and retina scans. Biometrics is used commonly in mobile devices).

Question 5

Explanation

Authentication based on usernames and passwords alone is unreliable and unwieldy, since users may have trouble storing, remembering, and managing them across multiple accounts, and many reuse passwords across services and create passwords that lack complexity. Passwords also offer weak security because of the ease of acquiring them through hacking, phishing, and malware.

Reference: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.html#~how-mfa-works

Note: In fact multifactor authentication (MFA) can help prevent man-in-the-middle as the hacker does not have the OTP code to log in. But from the link above, “phishing” is the answer Cisco wanted.

Question 6

Question 7

Explanation

Cisco ISE can determine the type of device or endpoint connecting to the network by performing “profiling.” Profiling is done by using DHCP, SNMP, Span, NetFlow, HTTP, RADIUS, DNS, or NMAP scans to collect as much metadata as possible to learn the device fingerprint.

NMAP (“Network Mapper”) is a popular network scanner which provides a lot of features. One of them is the OUI (Organizationally Unique Identifier) information. OUI is the first 24 bit or 6 hexadecimal value of the MAC address.

Note: DHCP probe cannot collect OUIs of endpoints. NMAP scan probe can collect these endpoint attributes:

+ EndPointPolicy
+ LastNmapScanCount
+ NmapScanCount
+ OUI
+ Operating-system

Reference: http://www.network-node.com/blog/2016/1/2/ise-20-profiling

Question 8

Explanation

Two-factor authentication adds a second layer of security to your online accounts. Verifying your identity using a second factor (like your phone or other mobile device) prevents anyone but you from logging in, even if they know your password.

Note: Single sign-on (SSO) is a property of identity and access management that enables users to securely authenticate with multiple applications and websites by logging in only once with just one set of credentials (username and password). With SSO, the application or website that the user is trying to access relies on a trusted third party to verify that users are who they say they are.

Comments (10) Comments
  1. Anonymous
    September 7th, 2020

    Q7: why is it NMAP and not DHCP?

  2. my_2_cents
    September 10th, 2020

    Yeah you can argue OUI is present in the DHCP Probe attributes as well , but DHCP Probe doesn’t then use the OUI for automatic endpoint profiling …

    My opinion is DHCP was thrown in there for confusion because :
    1) keyword “OUI” provided after DHCP Probe’s “dhcp-client-identifier” correlates MAC addresses to OUIs from corresponding mapping table, but that’s it.
    2) DHCP(IP Binding) probe is indeed essential for NMAP probe to be effective (it populates IP&MAC info in the Internal Endpoints DB which NMAP Probe then grabs OUI from).

    Reading question carefully again and with a glance over ISE Profiling , you’ll notice ISE NMAP Probe will be the one doing the automatic endpoint assignment , by having a device PROFILE created (“SPECIFIC” OUI used to detect device type in this scenario) which NMAP Scan can then use , so that any endpoint matching this profile could then be added to its own group automatically (NMAPscan does it for you).

  3. DnD
    November 5th, 2020

    Q8 should be B and D? Please advice

  4. yourman
    November 25th, 2020

    Q4. Shouldnt it be B and D?

    According to this DUO documentation

    https://duo.com/product/multi-factor-authentication-mfa/two-factor-authentication-2fa

  5. Ivan
    February 1st, 2021

    Q8 – all answers can be correct, depends on Duo license. Duo MFA is a base subscription, if it is a part of the question, I would say A,D,C,D are correct. for E more advance subscription is requred.

  6. Amammal
    February 20th, 2021

    Q7.
    In ISE Radius and DHCP probes are enabled by default but this question does not say ISE It just says engineer. NMAP probes can also be run from the FMC Network Discovery tool.
    My 2 cents

  7. Steve
    January 16th, 2022

    Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
    A. phishing
    B. brute force X
    C. man-in-the-middle X
    D. DDOS
    E. teardrop
    —–How on earth would 2FA protect you against MITM?

    Correct answer is Brute force and Phishing:
    https://duo.com/product/multi-factor-authentication-mfa/two-factor-authentication-2fa
    2FA protects against phishing, social engineering and password brute-force attacks and secures your logins from attackers exploiting weak or stolen credentials.

  8. Fred
    February 1st, 2022

    Q5 Which two kinds of attacks are prevented by multifactor authentication? (Choose two)

    agree w/ Steve

    The costs of hacking and phishing attacks can be high. Because MFA helps secure systems against unauthorized users–and their associated threats–the organization is more secure overall.

    Ref: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.html#~benefits

  9. Karl
    February 20th, 2022

    Q5 if we think about it the other way around, MITM cannot see both factors of Auth, because one of them is delivered out-of-band (sms or biometric factor) .. However if he can stay in the middle he can get access to the user account, and eventually be able to make changes ..

  10. Anonymous
    February 22nd, 2022

    @securitytut

    Q5 is wrong:
    Question 5 – Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
    A. phishing
    B. brute force

    Those are the real answers.

    It can be validated here:
    https://duo.com/product/multi-factor-authentication-mfa/two-factor-authentication-2fa

    and here:
    https://www.cisco.com/c/en_uk/solutions/small-business/webinars/how-to-prevent-cyber-attacks.html

Add a Comment