22 - Implementing Network Services Flashcards

1
Q

__ is used to synchronize timekeeping among a set of distributed time servers and clients. __ uses UDP port __ as both source and destination, which in turn runs over IP

A

NTP, NTP, 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An NTP client makes a __ with its server over its polling interval (_ to __ seconds) which dynamically changes over time depending on network conditions.

A

transaction, 64, 1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is not possible to adjust the NTP __ on a router.

A

poll interval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NTP can be configured to use __ messages instead. This reduces configuration complexity; however, the accuracy of timekeeping is marginally reduced because the flow is one way.

A

broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NTPv4 is an extension of NTPv3 and provides the following capabilities

A
  • Supports IPv6
  • Security is improved
  • Using specific multicast groups, NTPv4 can automatically calculate its time-distribution hierarchy through an entire network
  • In NTPv4 for IPv6, IPv6 multicast messages instead of IPv4 broadcast messages are used to send and received clock updates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NTP uses the concept of a __ to describe how many NTP hops away a machine is from an authoritative time source.

A

stratum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NTP mode: provides accurate time information to clients

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NTP mode: synchronises its time to the server

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NTP mode: exchange time synchronisation information.

A

peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NTP mode: Special “push” mode of NTP server.

A

broadcast/multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You can secure NTP operation by using __ and __.

A

authentication, access lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cisco devices support only __ authentication for NTP

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To configure NTP authentication:

A
  • Define the NTP authentication key with the ntp authentication-key command.
  • Enable NTP authentication by using the ntp authenticate command
  • Tell the device which keys are valid by using the ntp trusted-key command.
  • Specify the NTP server that requires authentication by using the ntp server ip_address key key_number command
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__ on the NTP server ensure that only authorised clients can synch with it. A lot of NTP synchronisation requests from the internet might overwhelm your NTP server devices. An attacker could use NTP queries to discover servers to which your device is synchronised and then, through an attack such as DNS cache poisoning, redirect your device to a system under its control.

A

access lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you configure NTP to peer with only a specified IP address?

A
  • Access-list 1 permit host 10.1.0.15

* Ntp access-group peer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you configure NTP to answer synch request from only 10.1.0.0/16 subnet devices?

A
  • Access-list 1 permit 10.1.0.0 0.0.255.255

* Ntp access-group serve-only 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where can Cisco devices display syslog messages or be configured to capture them in a log?

A
  • Console – by default, logging is enabled on the console port
  • AUX and VTY ports – to receive syslog messages, type the terminal monitor command.
  • Memory buffer – logging to memory logs message to an internal buffer. The buffer is circular in nature so new messages overwrite older messages after the buffer is filled. The buffer size can be change but to prevent router from running out of memory, do not make the buffer size too large. Use the logging buffered command. To display messages that are logged in the buffer, use the show logging command.
  • Syslog server – to log system messages to a remote host, use the logging host command.
  • Flash memory – Logging to buffer poses an issue when trying to capture debugs for an intermittent issue or during high traffic. When the buffer is full, older messages are overwritten. And when the device reboots, all messages are lost. Using persistent logging allows to write logged messages to files on the routers flash disk. To log messages to flash, use the logging persistent command.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the severity levels of syslog messages?

A
  1. Emergency
  2. Alert
  3. Critical
  4. Error
  5. Warning
  6. Notification
  7. Informational
  8. Debugging
19
Q

To limit messages logged based on severity, use the __command.

A

logging trap

20
Q

__ has become the standard for network management. It is a simple, easy to implement protocol that is supports by nearly all vendors. __ defines how management information is exchanged between __ managers and __ agents. It uses the UDP transport mechanism to retrieve and send management information, such as Management Information Base (MIB) variables.

A

SNMP

21
Q

There are two main components of SNMP:

A
  • SNMP manager or NMS (Network Manager Server) – collects management data from managed devices via polling or trap messages
  • SNMP agent – found on a managed network device, it locally organises data and sends it to the manager.
22
Q

__s are collections of definitions of the managed objects. SNMP agents keep the database of values for definitions written in the __.

A

MIB

23
Q

SNMPv1 introduced five message types:

A
  • Get Request
  • Get Next Request
  • Set Request
  • Get Response
  • Trap
24
Q

SNMPv2 introduced two new message types:

A
  • Get Bulk Request

* Inform Request

25
Q

SNMPv2 also added __-bit counters to accommodate faster network interfaces.

A

64

26
Q

SNMPv2 added a complex security model, which was never widely accepted. Instead a “lighter” version of SNMPv2 known as version __ was introduced and considered the de facto version 2 standard

A

2c

27
Q

SMNPv3 introduces three levels of security:

A
  • noAuthNoPriv – no authentication is required, and no privacy (encryption) is provided
  • authNoPriv – authentication is based on MD5 or SHA. No encryption is provided
  • authPriv – in addition to authentication, CBC-DES encryption is used.
28
Q

__ is an embedded Cisco IOS Software tool that reports the usage statistics of measured resources with the network, giving network managers clear insight to the traffic for analysis

A

NetFlow

29
Q

NetFlow requires three main components:

A
  • Flow exporter – router or network device that is in charge of collecting flow information and exporting it to the flow collector
  • Flow collector – a server that receives the exported flow information
  • Flow analyser – an application that analyses flow information collected by the flow collector.
30
Q

Routers and switches that support NetFlow can collect __ on all interfaces where NetFlow is enabled, and later export those statistics as NetFlow records toward at least one NetFlow collector.

A

IP statistics

31
Q

NetFlow identifies a traffic flow by identifying several characteristics within the __ (source and dest IP etc). One the traffic flow is identified, subsequent packets that match those attributes are regarded as part of that flow.

A

packet header

32
Q

The flow data that is collected is the NetFlow cache is useless unless and admin can access it. There are two primary methods to access NetFlow data, the __ or using an __ tool.

A

CLI, application reporting

33
Q

The following steps are used to implement NetFlow data report

A
  • NetFlow is configured to capture flows to the NetFlow cache, it is referred to as the “NetFlow record”
  • The NetFlow export is configured to send flows to the collector
  • The NetFlow cache is searched for flows that have terminated, which are exported to the NetFlow collector server
  • Approx 30-50 flows are bundled together and transported in UDP format to the NetFlow collector server, it is referred to as the “NetFlow monitor”
  • The NetFlow collector software creates real-time or historical reports from the data
34
Q

A flow is ready for export when it is __ for a certain time, or if the flow is long lived and lasts greater than the active timer.

A

inactive

35
Q

__ is an extension of NetFlow v9. It provides additional functionality that allows you to export more info using the same NetFlow v9 datagram. __ provides flexibility, scalability of flow data beyond traditional NetFlow.

A

Flexible NetFlow

36
Q

Original and Flexible NetFlow both use the values in key fields in IP datagrams, such as __ or __ address, as the criteria for determining when a new flow must be created in the cache while network traffic is being monitored.

A

source, destination

37
Q

Traditionally, an IP flow is based on a set of seven IP packet attributes. Flexible NetFlow allows the flow to be __; key fields are configurable allowing detailed traffic analysis.

A

user-defined

38
Q

Traditionally NetFlow has a single cache and all applications use the same cache info. Flexible NetFlow has the capability to create __ flow caches or information databases to track NetFlow information.

A

multiple

39
Q

With traditional NetFlow, typically seven IP packet fields are tracked to create NetFlow information. In flexible NetFlow, the user __ what to track.

A

configures

40
Q

Traditional NetFlow typically tracks IP information such as IP address, ports, protocols, TCP flags and most security systems look for anomalies. Flexible NetFlow allows the user to track a wide range of IP information including all the fields in the__ header, various individual TCP flags.

A

IPv4/IPv6

41
Q

Cisco IOS __ is a unique subsystem withing Cisco IOS software. __ is a powerful and flexible tool to automate tasks and customise the behaviour of Cisco IOS software and the operation of a device.

A

Embedded Event Manager (EEM)

42
Q

EEM can be used to create and run programs or scripts directly on a router or switch. The scripts are referred to as EEM __ and can be programmed using a simple CLI based interface or using a scripting language tool called Tool Command Language (Tcl)

A

policies

43
Q

__ allows you to respond to real-time events, automate tasks, create customised commands, and take local automated actions based on conditions or events detected by the Cisco IOS software itself.

A

EEM

44
Q

Policies can invoke several built-in actions for easy __. Actions can consist of sending SNMP traps and syslog messages, executing or disabled CLI commands, sending email, reloading the device, or running TcL scripts.

A

automation