11.1 Flashcards

1
Q

What’s outside the net work has never been trusted but now what’s inside the net work also can’t be trusted this is called the – – – – – – Security model where everything in the network is considered untrustworthy until proven otherwise

A

Zero trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network devices such as ——————— are designed to pass traffic through the net work as quickly and efficiently as possible

A

Routers and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The last decision is called the – – – – – rule which insurance any traffic the ACL does not explicitly permit is deny by default

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Thanks to a routers – – – – – – Routers can also declined to Ford certain packets depending on their contact

A

Access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On most routers each interface must be assigned a separate – – – – and different – – – – maybe associated with inbound and outbound traffic

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The – – – – command is used to sign statement to an ACL on Cisco routers and similar routers the commandments identify the ACL and include a permit or deny argument

A

access-list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This refers to the decision making layer of connective network devices

A

Control plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An adoption of quality of service filters can be used to rate limit traffic on the control plane and management plan of routers and switches using a feature called – – – – –

A

Control plane policing or COPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The – – – – command entered and team app configuration mode will pair of the class map created earlier it to your new policy map as follows

A

Class limit – I CMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The – – – – – feature filters are a Messages so the messages can only come from specific interfaces on the switch. Additionally – – – – offers other criteria that can filter are iMessages on Valon interfaces according to source Mac or IP address

A

RA guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Or a guard is configured on Cisco switches using Z – – – – – command

A

Raguard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A – – – – – – – running on a client device however could be used to implement and on Pass attack by configuring an attacker IP address is the victims computers default gateway

A

Rogue DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DHCP messages should be monitored by enabling – – – – – – on the

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Like like like like like like can we can figure it on a switch to protect against our spoofing attacks

A

DAI or dynamic ARP inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

 A – – – – – or proxy acts as an intermediary between the external and internal networks screening all incoming and outgoing traffic

A

Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Although a proxy server appears to the outside world as an internal network server in reality it’s merely another filter invoice for the – – – – –

A

Internal lan

17
Q

– – – – – Are often used by enterprise networks to protect internal network clients however individual sometimes rely on – – – – two mask there Internet activities

A

Proxy server

18
Q

Also proxies might sound similar to VPN there is a critical difference . – – – – Might encrypt traffic but proxy does not

A

VPN