BGP Flashcards

1
Q

What defines an Autonomous System (AS)?

A

A collection of IP prefixes under a single administrative entity with a common routing policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name types of BGP routing attacks.

A

Blackholing, redirection, instability, prefix hijacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is prefix hijacking?

A

Announcing unauthorized prefixes to redirect or drop traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What causes BGP security issues?

A

Lack of authentication, misconfigurations, and susceptibility to eavesdropping and manipulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can BGP threats be mitigated?

A

Neighbor authentication, TTL checks, prefix restrictions, and access control lists (ACLs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Secure BGP (S-BGP)?

A

A system where nodes sign announcements to authenticate paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does BGPSec enhance BGP security?

A

By digitally signing AS path updates and leveraging RPKI for origin validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Resource Public Key Infrastructure (RPKI)?

A

A PKI mapping AS numbers and IP prefixes to public keys for secure announcements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a DoS attack? (Denial of Service)

A

Overwhelming a victim with traffic to deny legitimate access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can spoofing be prevented?

A

Using BCP 38, ingress filtering, source address validation, and IP traceback.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Mirai botnet?

A

Malware that infects vulnerable IoT devices, turning them into a network used to launch large-scale distributed denial-of-service (DDoS) attacks, often exploiting weak passwords and outdated firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are IP traceback methods?

A

Logging, input debugging, controlled flooding, and marking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly