10 Flashcards
_____________ involves transmitting a large volume of TCP (SYN) connection requests to a target system and then does not complete the TCP three-way handshake; thus overwhelming the system.
How to mititagte?
TCP SYN Attack
permit tcp any any established line
TCP-Intercept
In _________ mode, the router acts as a proxy by handling the establishment of each TCP connection on behalf of both the client and server.
intercept
TCP-Intercept
in _________ mode, the software passively watches the connection requests flowing through the router. If a connection fails to get established in a configurable interval, the software sends a RST to the server to clear up its state
watch
A _____________ involve sending a a packet to the router with the same IP address in the source and destination fields
How do I mititgate?
land attack
_________ attacks send a large amount of ICMP Echo packets to a subnet’s broadcast address with a spoofed source IP address from that subnet
How do I mitigate?
Smurf
deny icmp any host “broadcast address”
_________ attacks are destined for a networks broadcast address and utilize udp
How do I mitigate?
How do I mitigate both fraggle and smurf?
fraggle
deny udp any host”broadcast address”
deny ip any host “broadcast address”
________ is used to describe when one network protocol, called the payload protocol, is encapsulated within a different delivery protocol
Tunneling
______________ is a suite of protocols for securing IP communications by authenticating and/or encrypting each IP packet in a data stream
IPsec
IPsec
In __________ mode, only the payload of the IP packet is encrypted and/or authenticated
transport
Ipsec
In __________ mode, the entire IP packet (data plus the message headers) is encrypted and/or authenticated
tunnel
The IP ___________ header provides integrity, authentication, and non-repudiation if the appropriate choice of cryptographic algorithms is made
Authentication
The IP _____________ provides confidentiality, along with optional (but strongly recommended) authentication and integrity protection
ESP
______ is the cisco default tunneling protocol designed to encapsulate a wide variety of Network Layer Packets inside IP tunneling packets
How can I tell if this tunneling protocol is being useed?
GRE
since its the default there wont be anything specifically telling you its this
________ is an __________ protocol that allows data exchange using a secure channel between two computers
SSH Application layer 7
___ and _____ are cryptographic protocols that provide secure communications on the internet for such things as web browsing, email, internet faxing, instant messaging, and other data transfers
TLS SSL