10 Flashcards

1
Q

_____________ involves transmitting a large volume of TCP (SYN) connection requests to a target system and then does not complete the TCP three-way handshake; thus overwhelming the system.

How to mititagte?

A

TCP SYN Attack

permit tcp any any established line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP-Intercept

In _________ mode, the router acts as a proxy by handling the establishment of each TCP connection on behalf of both the client and server.

A

intercept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP-Intercept

in _________ mode, the software passively watches the connection requests flowing through the router. If a connection fails to get established in a configurable interval, the software sends a RST to the server to clear up its state

A

watch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A _____________ involve sending a a packet to the router with the same IP address in the source and destination fields

How do I mititgate?

A

land attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_________ attacks send a large amount of ICMP Echo packets to a subnet’s broadcast address with a spoofed source IP address from that subnet

How do I mitigate?

A

Smurf

deny icmp any host “broadcast address”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_________ attacks are destined for a networks broadcast address and utilize udp

How do I mitigate?

How do I mitigate both fraggle and smurf?

A

fraggle
deny udp any host”broadcast address”

deny ip any host “broadcast address”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________ is used to describe when one network protocol, called the payload protocol, is encapsulated within a different delivery protocol

A

Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______________ is a suite of protocols for securing IP communications by authenticating and/or encrypting each IP packet in a data stream

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPsec

In __________ mode, only the payload of the IP packet is encrypted and/or authenticated

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ipsec

In __________ mode, the entire IP packet (data plus the message headers) is encrypted and/or authenticated

A

tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The IP ___________ header provides integrity, authentication, and non-repudiation if the appropriate choice of cryptographic algorithms is made

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The IP _____________ provides confidentiality, along with optional (but strongly recommended) authentication and integrity protection

A

ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______ is the cisco default tunneling protocol designed to encapsulate a wide variety of Network Layer Packets inside IP tunneling packets

How can I tell if this tunneling protocol is being useed?

A

GRE

since its the default there wont be anything specifically telling you its this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ is an __________ protocol that allows data exchange using a secure channel between two computers

A

SSH Application layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ and _____ are cryptographic protocols that provide secure communications on the internet for such things as web browsing, email, internet faxing, instant messaging, and other data transfers

A

TLS SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_______________ is a method of bypassing firewall or proxy restrictions. It works by creating a tunnel.

A

Http tunnel

17
Q

_______________, also known as network masquerading or IP-masquerading, involves rewriting source and/or destination addresses of IP packets as they pass through a router or firewall.

A

NAT

18
Q

Whihc of these terms are used to designate in what network a particular address appears in?
Local
Global
Inside
Outside

A

inside
outside

19
Q

How can I find the global inside address for a tunnel?

A

within the run configuration the first ip address mentioned by that tunnel is the global in

20
Q

__________ allows for a one-to-one translation of local to global addresses.

A

static

21
Q

_________ is translating multiple local addresses to a pool of global addresses.

A

Dtnamic

22
Q

_________, also referred to as Overloading in the router, is a form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports

A

PAT

23
Q

______________ is an extension to static mapping which allows one global address to be mapped to multiple inside addresses for distributing conversions among multiple hosts

A

TCP Load Distribution

24
Q

What nat command shows me active address translations occurring

A

show ip nat translations

25
Q

What are the three commands I need to know for this test?

A

show ip nat transaltions
show run
show access-list