08 Flashcards
__________ stored software and configuration state of the router itself, contains interface addresses, static routes, usernames, passwords, and privileges
What is compromised once this is taken?
core configuration
Dynamic Configuration
Network Traffic
__________ contains routing tables, ARP tables, and audit logs,
What is compromised once this is taken?
Dynamic configuration
Network Traffic
_________ The information that routers manage, forward, and filter, such as permitted protocols and services
Network Traffic
What is compromised once physical security is compromised?
everything
Stp Security
The _________________ is a way of preserving the STP topology by preventing the processing of any BDPUs received on a port. If a BDPU is received the port is automatically disabled and ports must be recovered manually
BDPU Guard Service
___________ provides a way to enforce the root bridge placement in the network, by not allowing a port to become a root port
Root Guard
_________ negotiates trunking on VLAN aware switches allowing switches to automatically learn and change port configurations based on the information gathered on each port.
DTP
In terms of security what should you do with vlans?
shut down any unused and never use the default vlan 1
How port security learns the valid Mac address
____________ manually configured by the administrator
___________ learned __________ for traffic. stored in the address table but not in the running config
__________ Manually configured or learned dynamically from traffic. Also stored in the running configuration. The running configuration is then saved, making the addresses static
Static
Dynamic
Sticky
Port Security violation actions
___________ administratively disables the port. Must be brought back up manually
__________ Forwards allowed traffic, drops violating traffic and increments the port security violation counter. Can also send an SNMP trap and send logs to syslog.
_________ Like restrict, but without logging violations
Shutdown
Restrict
Protect
How do I disable CDP on an interface/globally?
global mode: no cdp run
specific int: no cdp run
________/________ Occurs when an attacker manipulates and falsifies information and is used to hide an attacker’s identity
Masquerading/Spoofing
__________ The exploitation of a valid computer session - sometimes also called a session key
Session Hijacking
________ Includes manipulating router updates to cause traffic to flow to unauthorized destinations
Rerouting
________ Refers to willful attempts to cause disruptions by overwhelming the targeted system.
Denial of Service
_________ The unauthorized viewing and collection of network traffic
Eavesdropping and information theft
Port ___ Service _____ This command echoes back whatever is typed
7echo
Port __ Service ______ This service was originally designed to aid in troubleshooting links along a communications path.
9discard