08 Flashcards

1
Q

__________ stored software and configuration state of the router itself, contains interface addresses, static routes, usernames, passwords, and privileges

What is compromised once this is taken?

A

core configuration

Dynamic Configuration
Network Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__________ contains routing tables, ARP tables, and audit logs,
What is compromised once this is taken?

A

Dynamic configuration

Network Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_________ The information that routers manage, forward, and filter, such as permitted protocols and services

A

Network Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is compromised once physical security is compromised?

A

everything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stp Security

The _________________ is a way of preserving the STP topology by preventing the processing of any BDPUs received on a port. If a BDPU is received the port is automatically disabled and ports must be recovered manually

A

BDPU Guard Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___________ provides a way to enforce the root bridge placement in the network, by not allowing a port to become a root port

A

Root Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________ negotiates trunking on VLAN aware switches allowing switches to automatically learn and change port configurations based on the information gathered on each port.

A

DTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In terms of security what should you do with vlans?

A

shut down any unused and never use the default vlan 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How port security learns the valid Mac address

____________ manually configured by the administrator

___________ learned __________ for traffic. stored in the address table but not in the running config

__________ Manually configured or learned dynamically from traffic. Also stored in the running configuration. The running configuration is then saved, making the addresses static

A

Static

Dynamic

Sticky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port Security violation actions

___________ administratively disables the port. Must be brought back up manually

__________ Forwards allowed traffic, drops violating traffic and increments the port security violation counter. Can also send an SNMP trap and send logs to syslog.

_________ Like restrict, but without logging violations

A

Shutdown

Restrict

Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do I disable CDP on an interface/globally?

A

global mode: no cdp run
specific int: no cdp run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

________/________ Occurs when an attacker manipulates and falsifies information and is used to hide an attacker’s identity

A

Masquerading/Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ The exploitation of a valid computer session - sometimes also called a session key

A

Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ Includes manipulating router updates to cause traffic to flow to unauthorized destinations

A

Rerouting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ Refers to willful attempts to cause disruptions by overwhelming the targeted system.

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________ The unauthorized viewing and collection of network traffic

A

Eavesdropping and information theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port ___ Service _____ This command echoes back whatever is typed

A

7echo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Port __ Service ______ This service was originally designed to aid in troubleshooting links along a communications path.

A

9discard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Port _____ Service __________ This command returns system date and time

A

13daytime

20
Q

Port ____ Service ________ generates a 72-charcter string of ASCII characters from the remote host.

A

19chargen

21
Q

Service _____ Network hierarchy could be changed at layer 2 and loops introduced. Mitigate with BDPU guard and root guard

A

STP

22
Q

Service ____ Vlan hopping attack

A

DTP

23
Q

Service _____ Gives too much information about neighbors

A

CDP

24
Q

Service _________ Port ______ enumeration of logged in users and correlated with time, when they are usually working.

A

79finger

25
Q

Service ________
Port _______ Change system times, updates, logs, time based ACLs, syncing

A

UDP 123NTP

26
Q

Service _________ Allows a device to load their configuration fro over the network. Posing as a BootP server allows an adversary to pass a config of their choosing, or DoS by denying one.

A

Boot Network

27
Q

Service ___________ showing what is unreachable, and sometimes why.

Service ______ informs a host that a packet was sent to the wrong destination, and tells the sending machine the correct destination

Service _______ tells you that target networks size

A

Destination unreachable

Ip redirect

ICMP Mask reply

28
Q

Service ______ DNS Poisoning

A

DNS lookups

29
Q

Service _____ port ____ zero knowledge needed to configure a device, Could allow access to machine @ priv 15 with no username/pswd

command:

A

80HTTP

30
Q

Service _____ port _____ secure protocol zero knowledge needed to secure

A

TCP 443HTTPS

31
Q

Service ______ specify the route a packet takes bypassing security measures and changes Source IP whcih can bypass ACLs

A

IP Source Routing

32
Q

Service ______
V1&V2: sends packets in clear text
V3: encrypted

A

SNMP

33
Q

Service _______ enables a Cisco router to act as intermediary for ARP, breaking the LAN security perimeter allowing mac addresses too be sent past the switch onto the network

A

Proxy ARP

34
Q

Service _________ permits a host on one LAN segment to send broadcast messages on a different LAN segment

What vulnerability?

A

IP Directed Broadcast
Smurf attack

35
Q

Service _____ only forwards packets with valid addresses, Relies on CEF

commands?

A

uRPF
global config: ip cef
specific int: ip verify unicast reverse-path

36
Q

Service_____ port_____ is proprietary to MircoTik, it is a configuration and management software tool

A

TCP 8281WinBox

37
Q

___________ involves a direct connection to the console port of a device with a terminal emulator program such as HyperTerminal, or dumb terminals

A

Local access

38
Q

Password Recovery can only occur on a _________ port

A

Console Port

39
Q

How do I enable SSH?

A

assign a domain name
ip domian name jcac.net
make account
go into VTY lines 0 15
Login local
transport input none
transport input ssh

40
Q

___________ logs errors and blocks packets. Service____
port ____

A

UDP 514Syslog

41
Q

Standard IP Access Lists
What is the

A

Standard IP Access Lists

42
Q

Standard IP Access Lists

A

Standard IP Access Lists

43
Q

Extended IP Access Lists

A

Extended IP Access Lists

44
Q

Extended IP Access Lists

A

Extended IP Access Lists

45
Q
A