12 - Network Security Basics Flashcards

1
Q

What are the three general goals of adversaries?

A

access to information
modification of information
denial of access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an adversary?

A

An entity that poses a threat to the operation of a network device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a passive attack?

A

do not modify data and typically involve the monitoring of data flows between systems
ie packet sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an active attack?

A

typically modify or disrupt the flow of data

ie denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a close-in attack?

A

those that rely on the close physical proximity of the attacker to the target system
ie an attacker watching a user type in a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an insider attack?

A

involves a user that normally has some form of access to the target system
ie employee transferring confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a distribution attack?

A

occurs when a malicious user modifies hardware or software prior to installation
ie a software backdoor created by the vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four types of physical threats to a network?

A

electrical
hardware
environmental
administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two most threatening types of environmental threats?

A

temperature

humidity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some tools used in a reconnaissance attack?

A

ping sweeps
packet sniffing
port scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is promiscuous mode?

A

it will no longer ignore data that is no specifically addressed to the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an access attack?

A

used to gain unauthorized access to network systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some tools used to protect assets in a network?

A

antivirus software
antispyware software
ids and ips
firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What banner is always displayed prior to login?

A

the login banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What banner is displayed prior to login for telnet but not ssh?

A

the MOTD or message of the day banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What banner is displayed prior to the login banner?

A

MOTD banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What banner is displayed once the user successfully authenticates?

A

exec banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the three types of warning banners?

A

login banner
exec banner
motd banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the command for banner logins?

A

banner motd
banner login
banner exec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the command for reverse telnet sessions?

A

banner incoming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What command is needed for the password command to work on vty, aux, or console sessions?

A

login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What command is needed to encrypt passwords on a cisco device?

A

service password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What command is needed for the password command to work on vty, aux, or console sessions?

A

login local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the three phases of AAA?

A

Authentication-verifying a users identity
authorization-verifying the level of access for a user
accounting-process of recording the use of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What AAA standard is cisco proprietary?

A

Tacacs+

26
Q

What organization standardizes Radius?

A

IETF or internet engineering task force

27
Q

What AAA standard combines authentication and authorization?

A

Radius

28
Q

What AAA standard encrypts the entire contents of the packet?

A

tacacs+

29
Q

What AAA standard only encrypts the password in a packet?

A

Radius

30
Q

What port/ports is used in Radius AAA?

A

udp 1812 for authentication

udp 1813 for accounting

31
Q

What port/ports is used in Tacacs+ AAA?

A

tcp 49 for all three

32
Q

How do you configure AAA?

A

aaa new-model

username backup secret B0s0n

33
Q

What happens automatically when the aaa new-model command is issued?

A

local authentication is automatically applied to all interfaces and vty lines but not the console line

34
Q

What does enable password 0 mean?

A

the 0 indicates the password is unencrypted

35
Q

What does enable password 7 mean?

A

the 7 indicates the password is encrypted with ciscos original password algorithm

36
Q

What does enable secret 5 mean?

A

the 5 indicates the password is and md5 hash

37
Q

What is a logging severity of 0?

A

emergencies

38
Q

What is a logging severity of 1?

A

alerts

39
Q

What is a logging severity of 2?

A

critical

40
Q

What is a logging severity of 3?

A

errors

41
Q

What is a logging severity of 4?

A

warnings

42
Q

What is a logging severity of 5?

A

notifications

43
Q

What is a logging severity of 6?

A

informational

44
Q

What is a logging severity of 7?

A

debugging

45
Q

What is the default logging severity for console, monitor, and buffer?

A

all severities or debugging

46
Q

What command is used to send log messages to the vty lines?

A

logging monitor

47
Q

Where does logging buffered send log messages?

A

to the local device in memory, cleared out on reboots

48
Q

What command can you use to verify logging?

A

sh logging

49
Q

What command/commands are used to configure logging to a server?

A

logging host 10.10.10.10

logging trap 5

50
Q

What are best practices for unused switchports?

A

to shut them off

51
Q

How do you disable dynamic trunking protocol?

A

manually configuring an access or trunk port

switchport nonegotiate

52
Q

What does the switchport port-security mac-address sticky command do?

A

the switch will automatically create static mac address entries for that port, they will be lost on a reboot unless the writ mem command is issued

53
Q

What is the default port-security violation?

A

shutdown

54
Q

What does the port-security violation of protect do?

A

the switch will discard the traffic

55
Q

What does the port-security violation of restrict do?

A

discard the traffic, log the attempt, increment the security violation counter, and send and snmp trap message

56
Q

What does the port-security violation of shutdown do?

A

discard the traffic, log the attempt, increment the security violation counter, and place the port in err-disabled

57
Q

What command is used to verify port security on an interface?

A

sh port-security int fa0/1

58
Q

What command is used to verify that an NTP client is successfully authenticated?

A

sh ntp assoiations detail

59
Q

What is the default severity level for monitoring to a syslog server?

A

informational or 6

60
Q

What is the default date/time stamp for log messages?

A

uptime since routers last reboot