exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 40 discussion

Actual exam question from ISC's CISSP
Question #: 40
Topic #: 1
[All CISSP Questions]

Which of the following attacks, if successful, could give an intruder complete control of a software-defined networking (SDN) architecture?

  • A. A brute force password attack on the Secure Shell (SSH) port of the controller
  • B. Sending control messages to open a flow that does not pass a firewall from a compromised host within the network
  • C. Remote Authentication Dial-In User Service (RADIUS) token replay attack
  • D. Sniffing the traffic of a compromised host inside the network
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
N00b1e
Highly Voted 2 years, 6 months ago
Selected Answer: A
If you can get control of the controller, do you not own the network?
upvoted 10 times
1460168
8 months, 1 week ago
Brute-Forcing the SSH __PORT__... You aren't bruting the "port", you are bruting the service.
upvoted 2 times
...
franbarpro
2 years, 5 months ago
"YES" but how are you going to brute force the SSH password.
upvoted 3 times
ccKane
1 year, 6 months ago
Not the question. It is stated: "If successful..." therefore no matter how.
upvoted 5 times
...
...
dev46
2 years, 6 months ago
I will go with A too, the SDN controller is the heart. Compromising controller can initiate other attacks defined in B, C and D. https://www.routerfreak.com/9-types-software-defined-network-attacks-protect/
upvoted 3 times
...
jackdryan
1 year, 11 months ago
A is correct
upvoted 1 times
...
...
franbarpro
Highly Voted 2 years, 6 months ago
Agree with B https://www.networkworld.com/article/2840273/sdn-security-attack-vectors-and-sdn-hardening.html#:~:text=SDN%20Attack%20Vectors,new%20paradigm%20for%20network%20virtualization.
upvoted 5 times
...
Imranbhatti
Most Recent 3 weeks, 4 days ago
Selected Answer: A
Answer is A Option B, "Sending control messages to open a flow that does not pass a firewall from a compromised host within the network," is incorrect because it does not necessarily give an intruder complete control over the SDN architecture. While sending control messages from a compromised host can bypass certain security measures like firewalls, it typically affects only specific flows or segments of the network. This action does not compromise the central SDN controller itself, which is the core component managing the entire network. Without access to the controller, the attacker cannot gain full control over the SDN architecture12. In contrast, a successful brute force attack on the SSH port of the controller (Option A) would allow the attacker to take over the controller, giving them comprehensive control over the entire network. Answer is A
upvoted 1 times
...
iRyae
1 month, 2 weeks ago
Selected Answer: A
A successful brute-force attack on the SSH port of the SDN controller is the more dangerous scenario. The controller is the central brain of the SDN architecture. If an attacker gains control of it, they effectively gain control of the entire network. They can manipulate flows, reroute traffic, isolate devices, and perform any action imaginable within the network. While B (sending control messages to open a flow) is a serious attack, its scope is more limited. Even if successful, the attacker's control is generally restricted to the specific flow they manipulate. They might be able to intercept or modify traffic for that particular flow, but they don't automatically gain complete control of the entire SDN architecture. The controller still retains overall management. Compromising the controller itself, however, grants the attacker that complete control.
upvoted 1 times
...
martin451
5 months, 4 weeks ago
Selected Answer: A
Gaining access to the SDN controller through a brute force attack on the SSH port would allow the attacker to manipulate the entire network, as the controller is the central point of control in an SDN architecture.
upvoted 1 times
...
robervalchocolat
7 months ago
A brute force password attack on the SSH port of the SDN controller, if successful, could give an intruder complete control of the controller. This is because the controller is responsible for managing the network's configuration and traffic flows. If an attacker gains control of the controller, they can manipulate the network's behavior to their advantage.
upvoted 1 times
...
deeden
8 months ago
Selected Answer: A
I agree with A. If you could somehow bypass a firewall from a compromised host, then there's still a question of privileges and authorization of control messages to gain complete control. Unless you're sending it from a compromised admin host/account, which you might have potentially bruteforced (presumably). lol
upvoted 1 times
...
CCNPWILL
10 months ago
Selected Answer: B
Most of these SDN questions and compromising it CISSP exam usually looks for controller related answer ive come to notice. compromising the controller gives you access to the fabric.
upvoted 1 times
...
duplexjay
10 months, 1 week ago
A gives complete control while B gives complete access.
upvoted 1 times
...
Jenkins3mol
11 months, 1 week ago
Selected Answer: A
My AI told me that A is correct. So that is it.
upvoted 2 times
...
25cbb5f
1 year ago
Out of the options provided, the attack most likely to give an intruder complete control of an SDN architecture is: A. A brute force password attack on the Secure Shell (SSH) port of the controller Here's why: Why SDN Controllers are Critical Targets: SDN separates the control plane (where network configuration happens) from the data plane (where traffic flows). The controller is the central, highly privileged component that orchestrates the entire network. Compromising it would grant an attacker substantial power. Brute Force and SSH: A brute force attack attempts to guess the controller's administrative credentials through repeated login attempts. SSH is a common remote management protocol, and if its protection is weak, a successful brute force attack can lead to control plane takeover.
upvoted 1 times
...
Parikshitcyber
1 year ago
While gaining SSH access to the controller through a brute force password attack option A is indeed a serious security concern and could potentially allow an attacker to gain administrative access to the SDN controller, it may not necessarily result in complete control of the entire SDN architecture. On the other hand, option B describes an attack scenario where a compromised host within the network sends control messages to the SDN controller to open a flow that bypasses the firewall. This attack directly targets the SDN architecture itself and could potentially give the intruder complete control over network traffic flows, allowing them to manipulate traffic and potentially compromise other network devices or services. Thats why it is B
upvoted 1 times
...
Ukpes
1 year, 5 months ago
Selected Answer: B
This type of attack, known as a flow rule modification attack, can allow an attacker to inject malicious traffic into the network or bypass security controls, giving the attacker complete control over the network.
upvoted 2 times
...
homeysl
1 year, 5 months ago
Selected Answer: A
easy one. A is my answer.
upvoted 1 times
...
Bach1968
1 year, 9 months ago
Selected Answer: B
The attack that could give an intruder complete control of a software-defined networking (SDN) architecture is option B: Sending control messages to open a flow that does not pass a firewall from a compromised host within the network. In software-defined networking, the SDN controller is responsible for managing and controlling the network infrastructure. By sending control messages to open a flow that bypasses the firewall from a compromised host within the network, an attacker can gain unauthorized access and manipulate the network's behavior. B
upvoted 3 times
...
HughJassole
1 year, 9 months ago
A. "By compromising the SDN controller, a hacker could have total control of the network." I googled B and C and those don't come up, so I don't think they are valid. D. is just sniffing traffic. This seems too easy, but based on all my research A it is.
upvoted 1 times
HughJassole
1 year, 8 months ago
I researched this more and thought about it, A doesn't make sense because once you ssh into a system you need to become root to do any damage, otherwise it's pointless. B. is absolutely correct: "If an attacker could create a flow that bypasses the traffic steering that guides traffic through a firewall the attacker would have a decided advantage." "The attacker would want to instantiate new flows by either spoofing northbound API messages or spoofing southbound messages toward the network devices. If an attacker can successfully spoof flows from the legitimate controller then the attacker would have the ability to allow traffic to flow across the SDN at their will and possibly bypass policies that may be relied on for security." https://www.networkworld.com/article/2840273/sdn-security-attack-vectors-and-sdn-hardening.html
upvoted 5 times
...
...
KelvinYau
1 year, 10 months ago
Selected Answer: A
Voted A
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago