Chapter 3 and 4, Homework 5

Discuss the differences between physical switches and virtual switches.

Physical switch help connect physical devices and allow for communication across a network. Devices are physically linked to the switch, and it helps control network traffic, and packets, allowing for network flexibility. A virtual switch does the same thing, but for virtual machines. Virtual machines are connected via a virtual switch, are also made using a hypervisor, and prevents devices from sharing resources while enabling connection.

Compare a production checkpoint to a standard checkpoint. What are the benefits of one over the other, and what are the situations where each would be used?

A production checkpoint normally uses backups, fail-safes, and “snapshots” in the event of a failure, so that ongoing work, progress, and most importantly, information, isn’t completely lost. A standard checkpoint has similar systems, but on a larger scale, with the goal being to protect configuration data, and running applications. Production checkpoints are normally smaller in scale and can be restored later with backup(s), allowing for a somewhat safe retrieval of work because of a system failure. Standard checkpoints are useful for repeating circumstances that led to a catastrophic failure, so you can pinpoint exactly where the issue started.

Why should an administrator spread Flexible Single Master Operations (FSMO) roles within a forest and domains amongst different domain controllers?

Spreading FSMO roles throughout different domain controllers is a redundancy measure. Basically, if for whatever reason, if one domain controller is taken down, or goes offline, the others are there as backups. While operating normally, it also splits up roles or tasks like syncing devices, managing security protocols, etc.

What are the advantages and disadvantages of using a read-only domain controller (RODC).

Read-Only Domain Controllers have the advantage of being good for security, access, performance, and efficiency most of the time. It can’t be written to so it can’t be overwritten and corrupted. The downside is it doesn’t allow for the same degree of access as a writable DC, and while not writable, they could be utilized to escalate intruder privileges.


Describe what happened during the first Bank break in Jamaica and what did they hack?

During the Jamaican Bank Break, they masqueraded as auditors to get inside, and used a hollow clipboard to sneak in the equipment they’d need. They use people coming and going in and out of secure areas to traverse the building. They even got a person in the call center to enter their credentials while secretly recording. His friend goes to a nearby computer, and they hack the device. Even after being caught, they use Plan B to get out of trouble. They were successfully able to hack into a call center PC, and an ATM.

Explain three of the five key strategies that the client could have implemented to prevent the first Bank in Jamaica from being hacked.

The first strategy would have been to prevent random people from accessing secure locations without solid credentials. They need to train their employees to be more suspicious of random people in the bank. The second would be to properly vet the credentials of someone coming in to perform any sort of audit. With access to different parts of their bank or network, they could do massive damage. Finally, assigning them a proper escort to monitor them would have been a sound idea. Without supervision, they have unrestrained access to a lot of the facilities, and even after being caught, were able to get away scot-free.

Give an overview of what transpired when the human hackers pretending to be a pest control worker.

They planned to access a building by pretending to be pest control workers to sneak a USB into a computer and decided to scout the building the day before. They decide to try slipping a USB stick into the facility, and hope someone finds it, and plugs it into a device to see what’s on it, enabling the malicious code to infect the device. What ended up happening is someone got suspicious, and had security review the footage, and they found them casing the building, and slipping the USB unto the door. The cops detain, and interrogate them the next day, and they end up having to tell them who they are, and why they’re there. They get info out of them after things calm down, and finally successfully break in.