CH 5 Flashcards

1
Q

technology originally created by Cisco that provides comprehensive visibility
into all network traffic that traverses a Cisco-supported device

A

netflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a unidirectional series of packets between a given source and destination

A

flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is often referred to as the five-tuple

A

source and destination ip address, source and destination ports, and ip protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

can track a wide range of Layer 2, IPv4,
and IPv6 flow information

A

flexible netflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

list 3 things that netflow can provide

A

non-repudiation, anomaly detection, investigative capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(NIST) created the following
methodology on security incident handling, which has been adopted by many organizations,
including service providers, enterprises, and government organizations:

A

1) Preparation
2) Detection and Analysis
3) Containment, eradication and recovery
4) Post-incident activity (postmortem and lessons learned)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

augments visibility where NetFlow is not available in the infrastructure device (router, switch,
and so on) or where NetFlow is available but you want deeper visibility into performance
metrics and packet data.

A

Cisco Stealthwatch Flow Sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a network flow standard led by
the Internet Engineering Task Force (IETF) created for a common, universal
standard of export for the flow information from routers, switches, firewalls, and other
infrastructure devices.

A

IPFIX (Internet Protocol Flow Information Export)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

describes the structure of flow data records within a data set, composed of (information element [IE] and length) pairs

A

IPFIX template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

provide field
type information for each template.

A

IE (information element)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

provides a packet transport service designed to support several
features beyond TCP or UDP capabilities including Packet streams, Partial reliability (PR) extension, Unordered delivery of packets or records, and Transport layer multihoming

A

SCTP (Stream Control Transmission Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a collection of services available
in several Cisco network infrastructure devices to provide application-level classification,
monitoring, and traffic control.

A

AVC (Cisco Application Visibility and Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the 4 capabilities of AVC

A

■ Application recognition
■ Metrics collection and exporting
■ Management and reporting systems
■ Network traffic control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does Cisco AVC use to to provide deep packet inspection (DPI) technology to identify a wide variety of applications
within the network traffic flow, using Layer 3 to Layer 7 data

A

NBAR2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List 6 netflow deployment scenarios

A

user access layer
wireless LAN
INET edge
Data Center
Site to Site VPN
Cloud Environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

collects network flow information from an endpoint on or off premises

A

NVM (network visibility module for anyconnect)

17
Q

uses NetFlow telemetry and contextual information
from the Cisco network infrastructure. This solution allows network administrators and
cybersecurity professionals to analyze network telemetry in a timely manner to defend
against advanced cyber threats

A

Cisco Stealthwatch

18
Q

the concept of “proactively” or “actively” searching for advanced threats
that may evade your security products and capabilities.

A

threat hunting

19
Q

can identify malicious (malware) communications in encrypted traffic through
passive monitoring, the extraction of relevant data elements, and a combination of behavioral
modeling and machine learning

A

Cisco ETA (encrypted traffic analytics)

20
Q

a cloud-based Cisco solution that uses machine
learning and statistical modeling of networks to creates a baseline of the traffic in your network and identify anomalies

A

Cisco CTA (Cisco Cognitive Threat Analytics)

21
Q

the process of logically grouping network assets, resources,
and applications

A

Network Segmentation

22
Q

A micro-segment in ACI is also often referred to as a

A

uSeg EPG

23
Q

a control plane protocol used to convey
IP-to-SGT mappings to network devices when you cannot perform inline tagging

A

SXP (Scalable Group Tag Exchange Protocol)