Monday, December 21, 2015

Bad actors race to exploit Juniper firewall vulnerability

Efforts afoot to reverse engineer the flaw and create commodity exploits

Now that Juniper has created a patch for its vulnerable firewall/VPN appliances, bad actors are setting to work reverse engineering the flaw so they can exploit devices that users don’t patch, and also make a profit by selling their exploits to others.

UPDATE: Wired reports a Dutch security firm claims it found the backdoor to ScreenOS within six hours of receiving the patch. Also, Reuters reports the Department of Homeland Security is investigating and CNN says the FBI is investigating as well.

“That’s what they do,” says John Pironti, president of IP Architects, who says he spent Friday responding to concerns about the compromised Juniper firewalls with his clients.

The pattern cyber criminals follow after vendors patch vulnerabilities is to compare the patched code to the unpatched code, figure out what the flawed code was and figure out how to use it to break into the device and the network it protects, Pironti says.

In this case Juniper says the flaw can be exploited to completely compromise a NetScreen firewall/VPN appliance via unauthorized remote administrator access via telnet or SSH, wipe out logs that would reveal the attack, and decrypt VPN traffic.

Once the reverse engineers do that, they’ll start trying out the exploit on whatever NetScreen devices they can locate in real-world networks hoping to find ones that aren’t patched, Pironti says. After that the exploits will go up for sale in underground markets and wend their way into open source penetration-testing platforms such as metasploit.

Inevitably some users fail to apply critical patches for years and years after they have been issued, he says. “It will be used for years,” he says. “This will not go away overnight.”

Since attackers can erase any trace they exploited a NetScreen appliance, IT security teams should start checking logs in the devices in line behind the firewall/VPNs. They should look for consistent and persistent traffic originating from unfamiliar and atypical IP address ranges that could represent the attackers moving inside the network once they’ve cracked the appliance, Pironti says. “See if they tried to get elsewhere,” he says.

Meanwhile, as of Friday, Juniper had yet to answer some key questions about the bad code.

In response to emails seeking more information, Juniper reiterated part of its initial announcement about the patches and provided a link to its formal advisory, but that’s it.

vulnerability?
Is there any way to find out if the vulnerability has been exploited in a particular device?

“I think that Juniper does owe us more information,” says Joel Snyder, senior partner in Opus One, a technology consultancy that has tested network firewalls for Network World. “In any case, I think that Juniper should be forthcoming with more information to let us know if they think that this was put in accidentally, on purpose, and by whom.”

It’s possible the bug was put there by a nation-state, he says, but “I would guess that it is just as likely that this is a human error and someone put something in ignorantly or for debugging that they forgot to take out.”

“People have been quick to say that this is linked to the NSA/InfoSec community in the [U.S. government], but I seriously doubt that. ... This was something IN the code, and it was introduced in the last few years after the product was REALLY mature.”

But the wording of the Juniper announcement – it pins the problem on “unauthorized code” – makes Pironti think it was an implant, software placed in the operating system intentionally to facilitate attacks. “Unauthorized code, to me, means an implant. It’s not like someone fat-fingered an entry.”


Monday, December 7, 2015

Windows 10 Mobile gets an end-of-life date, surrounded by mystery

Microsoft promises at least two years of “incremental” updates for its current smartphone operating system.

Microsoft has posted an end-of-life date for Windows 10 Mobile, though it raises more questions than it answers.

According to Microsoft’s support website, mainstream Windows 10 Mobile support will cease on January 9, 2018. However, the posting also says Microsoft will make extended support updates and security patches available for “a minimum of 24 months after the lifecycle start date” of November 16, 2015.

Stranger still, the support site originally listed an end date of January 8, 2019 when WinBeta discovered it last night, with Microsoft promising updates for “a minimum of 36 months.” Since then, the document has changed to reduce Windows 10 Mobile’s lifespan by one year.

It gets weirder. Although Microsoft has previously said that Microsoft alone would distribute Windows 10 Mobile updates, with wireless carriers playing just a supporting role, the support document suggests otherwise. “The distribution of these incremental updates may be controlled by the mobile operator or the phone manufacturer from which you purchased your phone, and installation will require that your phone have any prior updates,” it says. (Windows Insiders can always install preview builds without going through carriers, though this increases the risk of running into bugs.)

Microsoft’s support site doesn’t shed any light on what will happen after January 2018. We can only speculate that a more significant upgrade for Microsoft’s mobile operating system will arrive, assuming the whole effort hasn’t cratered by then.

Why this matters: Long-lasting hardware support has been a touchy issue for Windows Phones over the years. Windows Phone 7 was a clean break from the old Windows Mobile, and Microsoft famously abandoned Windows Phone 7 users (and the existing app ecosystem) when it moved to Windows Phone 8. With Windows 10 Mobile, Microsoft has repeatedly walked back its upgrade promises for existing phones, and today the only phone running the latest stable operating system are the brand-new Lumia 950 and Lumia 950 XL. With Microsoft’s support document leaving plenty of open questions, Windows phone fans could be reasonably skittish about their upgrade paths from here on.

Thursday, November 26, 2015

98-365 Windows Server Administration Fundamentals


QUESTION 1
Users report that they are unable to print. You verify that the print spooler service is running. What should you do next?

A. Purge the service
B. Disable the service
C. Pause the service
D. Restart the service

Answer: D


QUESTION 2
To protect a server in case of a blackout, you should use a/an:

A. Uninterruptible Power Supply.
B. Dedicated surge protector.
C. Power Supply Unit.
D. Redundant power supply.
E. Hot-swappable power supply.
F. Line conditioner.

Answer: A


QUESTION 3
Power On Self Test (POST) runs when a computer first boots.
Which component software issues this test?

A. Complementary Metal Oxide Semiconductor
B. Northbridge On Board Chip
C. Basic Input/Output System
D. Southbridge On Board Chip

Answer: C

Explanation: The four main functions of a PC BIOS (Basic Input/Output System).
POST - Test the computer hardware and make sure no errors exist before loading the operating system. Additional information on the POST can be found on our POST and Beep Codes page.
Bootstrap Loader - Locate the operating system. If a capable operating system is located, the BIOS will pass control to it.
BIOS drivers - Low level drivers that give the computer basic operational control over your computer's hardware.
BIOS or CMOS Setup- - Configuration program that allows you to configure hardware settings including system settings such as computer passwords, time, and date.
Reference: http://www.computerhope.com/jargon/b/bios.htm


QUESTION 4
You have an Active Directory infrastructure that contains one domain and seven domain controllers. How many forests can you have without creating any trusts?

A. 0
B. 1
C. 7
D. 8

Answer: B

Explanation: In a Windows Server 2003 forest, you can link two disjoined Windows Server 2003 forests together to form a one-way or two-way, transitive trust relationships. A two-way, forest trust is used to form a transitive trust relationship between every domain in both forests.


QUESTION 5
You are troubleshooting a permissions issue with the Reports share. The permissions are shown in the following image:


The groups connect to the share.
Use the drop-down menus to select the answer choice that answers each question. Each correct selection is worth one point.


Answer:



QUESTION 6
Which RAID level mirrors a set of disks and then stripes across the disks?

A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10

Answer: D

Explanation: A RAID 1+0, sometimes called RAID 1&0 or RAID 10. RAID 10 is a stripe of mirrors.

Wednesday, November 18, 2015

200-310 Designing for Cisco Internetwork Solutions

200-310 Designing for Cisco Internetwork Solutions

Exam Number: 200-310 DESGN
Associated Certifications: CCDA
Duration: 75 minutes (55-65 questions)
Available Languages: English

Exam Description
The Designing for Cisco Internetwork Solutions (DESGN) exam (200-310) is a 75- minute assessment with 55–65 questions that are associated with the Cisco CCDA® Design certification. This exam requires a foundation or apprentice knowledge of network design for Cisco enterprise network architectures. CCDA certified professionals can design routed and switched network infrastructures and services involving LAN/WAN technologies for SMB or basic enterprise campus and branch networks.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Design Methodologies 15%
1.1 Describe the Cisco Design lifecycle – PBM (plan, build, manage)
1.2 Describe the information required to characterize an existing network as part of the planning for a design change
1.3 Describe the use cases and benefits of network characterization tools (SNMP, NBAR, NetFlow)
1.4 Compare and contrast the top-down and bottom-up design approaches

2.0 Design Objectives 20%
2.1 Describe the importance and application of modularity in a network
2.2 Describe the importance and application of hierarchy in a network
2.3 Describe the importance and application of scalability in a network
2.4 Describe the importance and application of resiliency in a network
2.5 Describe the importance and application of concept of fault domains in a network

3.0 Addressing and Routing Protocols in an Existing Network 20%
3.1 Describe the concept of scalable addressing
3.1.a Hierarchy
3.1.b Summarization
3.1.c Efficiency

3.2 Design an effective IP addressing scheme

3.2.a Subnetting
3.2.b Summarization
3.2.c Scalability
3.2.d NAT

3.3 Identify routing protocol scalability considerations

3.3.a Number of peers
3.3.b Convergence requirements
3.3.c Summarization boundaries and techniques
3.3.d Number of routing entries
3.3.e Impact of routing table of performance
3.3.f Size of the flooding domain
3.3.g Topology

3.4 Design a routing protocol expansion

3.4.a IGP protocols (EIGRP, OSPF, ISIS)
3.4.b BGP (eBGP peering, iBGP peering

4.0 Enterprise Network Design 20%

4.1 Design a basic campus

4.1.a Layer 2/Layer 3 demarcation
4.1.b Spanning tree
4.1.c Ether channels
4.1.d First Hop Redundancy Protocols (FHRP)
4.1.e Chassis virtualization

4.2 Design a basic enterprise network

4.2.a Layer 3 protocols and redistribution
4.2.b WAN connectivity
4.2.b(i) Topologies (hub and spoke, spoke to spoke, point to point, full/partial mesh)
4.2.b(ii) Connectivity methods (DMVPN, get VPN, MPLS Layer 3 VPN, Layer 2 VPN, static IPsec, GRE,VTI)
4.2.b(iii) Resiliency (SLAs, backup links, QoS)
4.2.c Connections to the data center
4.2.d Edge connectivity
4.2.d(i) Internet connectivity
4.2.d(ii) ACLs and firewall placements
4.2.d(iii) NAT placement

4.3 Design a basic branch network

4.3.a Redundancy
4.3.a(i) Connectivity
4.3.a(ii) Hardware
4.3.a(iii) Service provider
4.3.b Link capacity
4.3.b(i) Bandwidth
4.3.b(ii) Delay

5.0 Considerations for Expanding an Existing Network 25%

5.1 Describe design considerations for wireless network architectures

5.1.a Physical and virtual controllers
5.1.b Centralized and decentralized designs

5.2 Identify integration considerations and requirements for controller-based wireless networks

5.2.a Traffic flows
5.2.b Bandwidth consumption
5.2.c AP and controller connectivity
5.2.d QoS

5.3 Describe security controls integration considerations

5.3.a Traffic filtering and inspection
5.3.b Firewall and IPS placement and functionality

5.4 Identify traffic flow implications as a result of security controls

5.4.a Client access methods
5.4.b Network access control

5.5 Identify high-level considerations for collaboration (voice, streaming video, interactive video) applications

5.5.a QoS (shaping vs. policing, trust boundaries, jitter, delay, loss)
5.5.b Capacity
5.5.c Convergence time
5.5.d Service placement

5.6 Describe the concepts of virtualization within a network design

5.7 Identify network elements that can be virtualized

5.7.a Physical elements (chassis, VSS, VDC, contexts)
5.7.b Logical elements (routing elements, tunneling, VRFs, VLANs)

5.8 Describe the concepts of network programmability within a network design

5.8.a APIs
5.8.b Controllers
5.8.c Application Centric Infrastructure (ACI)

5.9 Describe data center components

5.9.a Server load balancing basics
5.9.b Blocking vs. non-blocking Layer 2
5.9.c Layer 2 extension

Monday, October 26, 2015

77-882 Excel 2010

QUESTION 1
You work as a Sales Assistant at ABC.com. All users in the Sales department run Microsoft Office 2010.
You currently have Excel 2010 open and are working on a new workbook. You want to open an
existing workbook that is saved in your Documents folder.
Which two of the following methods could you use to open an existing workbook? Choose two.

A. Click the File tab and select Open.
B. Click the Office Button and select Open.
C. Use the Ctrl + E keyboard shortcut.
D. Use the Ctrl + O keyboard shortcut.
E. Use the Ctrl + N keyboard shortcut.

Answer: A,D

Explanation:


QUESTION 2
You are employed as a financial administrator at ABC.com. You are using Microsoft Office Excel
2010 to create a financial report ready for a meeting with ABC.com senior management.
You want to print a table from your financial report.
Which combination of the following steps will print the table without printing the rest of the
worksheet? Choose three.

A. Select the worksheet that contains the table.
B. Select the table.
C. Click the File tab button > Print.
D. Click the File tab > Print > Print Preview.
E. Select Print Active Sheet in the Print Settings section.
F. Select Print Selected Table in the Print Settings section.
G. Select Print Selection in the Print Settings section.

Answer: B,C,F

Explanation:


QUESTION 3
You are employed as a financial administrator at ABC.com. You are using Microsoft Office Excel
2010 to create a financial report.
The first worksheet in the financial report contains sales figures for each Sales person for the first
quarter of the year. The second worksheet contains sales figures for each Sales person for the
second quarter of the year. The third worksheet contains formulas that pull data from the sales
figures on the first and second worksheets.
You want to view all three worksheets simultaneously so you can see how the totals on the third
worksheet are affected by changes to the figures in the first two worksheets. You currently have
the workbook open in Excel.
Which combination of the following steps would enable you to view all three worksheets side-byside?
Choose two.

A. Use the File tab > Open function to open two more copies of the workbook.
B. Navigate to the View tab and use the New Window function to open two more copies of the
workbook.
C. Open two more copies of Excel 2010 and open two more copies of the workbook.
D. Use the Save As function to save two more copies of the workbook with different names.
E. Resize the Excel windows to display all three copies of the workbook side-by-side.
F. Use the Arrange All > Arrange Vertical function to display all three copies of the workbook sideby-
side.

Answer: B,F

Explanation:


QUESTION 4
You work as the Sales Manager at ABC.com. You are using Microsoft Office Excel 2010 to create
a workbook.
The workbook will be used to track deployments of the company’s product to customers. The
workbook will be updated by members of the deployment team and by other users in the Sales
department. You save the workbook and share it.
One month later, you modify the workbook by adding a formula to a cell in one of the worksheets.
The formula pulls data from other worksheets in the workbook. The formula does not work as
expected. You suspect that the some of the data in the workbook is invalid.
You select some cells and want to validate the data. You navigate to the Data tab but the Data
Validation option is unavailable.
What do you need to do before you can configure data validation rules?

A. You need to inspect the workbook.
B. You need to disable the sharing.
C. You need to disable protection on the workbook.
D. You need to disable encryption on the workbook.

Answer: B

Explanation:


QUESTION 5
You work as the Sales Manager at ABC.com. You are using Microsoft Office Excel 2010 to edit a
Sales report.
The workbook contains twelve worksheets named January through December. Each worksheet
contains a sales table listing the names of the Sales staff and the values of their sales for that
month. The format and layout of the table is identical on each worksheet.
You add another worksheet named Totals and Analysis to the Sales report workbook. You want to
create formulas in the Totals and Analysis worksheet that use references to sales values from the
tables on the other worksheets.
What type of cell reference is used to refer to the same cells on multiple worksheets within a
workbook?

A. A Tiered Cell Reference.
B. A 3-D Cell Reference.
C. A Multi-Cell Reference.
D. A Relative Cell Reference.

Answer: B

Explanation:

Tuesday, October 6, 2015

Exam MB6-704 Microsoft Dynamics AX 2012 R3 CU8 Development Introduction


QUESTION 1
You have two tables named Table l and Table2. There is a relationship between the tables.
You need to display data from both tables in a form.
How should you create the data source for the form?

A. Add both tables to a perspective and use the perspective as the data source.
B. Create a new table named Table3 that is related to Table l and Table2. Use Tables as the data source.
C. Add both tables to a map and use the map as the data source.
D. Add both tables to a query and use the query as the data source.

Answer: D


QUESTION 2
You plan to import a .xpo file to Dynamics AX.
You need to identify which changes the .xpo code will make to the Dynamics AX environment prior to importing the .xpo file,
Which tool should you use?

A. The Compare tool
B. The Code profiler
C. The X++ compiler
D. The Tracing cockpit

Answer: A


QUESTION 3
You are writing logic to fetch data from a database. The logic will use a select statement.
You need to identify which keyword to use to fetch a single record from the database.
Which keyword should you use?

A. FirstFast
B. ForUpdate
C. Exists
D. FirstOnly

Answer: D


QUESTION 4
You need to identify which permission can be set only on a form that has date effective data.
Which permission should you identify?

A. Correct
B. Create
C. Delete
D. Read
E. Update

Answer: A


QUESTION 5
You need to identify which elements the Reverse engineer tool will provide for a data model.
Which three elements should you identify? Each correct answer presents part of the solution.

A. Table methods
B. Classes
C. Table fields
D. Base enumerations
E. Extended data types (EDTs)

Answer: C,D,E