Chapter 5 Flashcards

1
Q

What AAA function verifies identity?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What AAA function determines user permissions?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What AAA function monitors resources being used and logs session statistics?

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does an AAA server typically do when it receives an authentication request?

A

Challenges the user’s credentials by asking for username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the AAA server do after a user’s credentials are authenticated?

A

Authorizes them and decides which user profile to apply to the specific user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the last process in the AAA framework

A

Accounts for everything the user is doing within the network and monitors resource usage and session statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two protocols used in IPsec?

A

ESP (encapsulating security payload)
AH (authentication header)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol transports data in a site-to-site VPN?

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is encrypted multicast traffic carried between remote sites?

A

GRE (multicast) over IPsec (encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What category of traffic is sent with IPsec?

A

Unicast traffic between two endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What IPsec mode and protocol encrypt and encapsulate the entire packet?

A

Tunnel (encrypts) ESP (encapsulates)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Internet Key Exchange (IKE) do?

A

Handles negotiation of protocols and algorithms. Generates the encryption and authentication keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whats the difference between ESP tunnel and transport mode?

A

Tunnel protects the routing info by encrypting the IP header while transport mode only encrypts the payload and ESP trailer. Tunnel mode is used in site-to-site VPNs and transport mode is used in client-to-site VPNs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which security program describes badge authentication for building access?

A

Physical access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which security program describes purposely sending emails to their staff that simulates an attack?

A

User awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What formats are available to select when configuring a WLAN with a WPA2 PSK in the GUI?

A

ASCII, hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of encryption is used for WPA2-PSK?

A

AES-128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an enhancement that was implemented with WPA3?

A

Forward secrecy
SAE for authentication (protection against brute force attacks)
192-bit key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What encryption does WPA1 use?

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which WPA mode uses PSK for authentication?

A

Personal or WPA-PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which wireless security protocols use block chain cipher types?

A

WPA2, WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does WPA3 replace PSK with?

A

SAE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How many ASCII text characters can can a WPA pre-shared key contain?

A

8-63

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How many hexadecimal characters can can a WPA pre-shared key contain?

A

64 minimum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a CRL?

A

Certificate Revocation List
Informs devices when a certificate is revoked/withdrawn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a CA?

A

Certificate Authority
A trusted entity that grants digital certificates to individuals/organizations to establish secure connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is 802.11x?

A

An authentication protocol to allow network access with a RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a mitigation technique for ARP spoofing?

A

Dynamic ARP inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a mitigation technique for 802.1q double tagging?

A

Configuring a VLAN access control list (VACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a mitigation technique for unwanted BPDUs on PortFast ports?

A

BPDU guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a mitigation technique for MAC flooding attacks?

A

Port security
Authentication with AAA server
802.1x

32
Q

What does DHCP snooping do?

A

Determines whether or not traffic sources are trusted or untrusted
Filters messages and rate-limits traffic from untrusted sources

33
Q

What threats can DHCP snooping mitigate?

A

Rogue DHCP server
Rogue clients on the network
Man-in-the-middle attacks

34
Q

What can be done in response to ARP poisoning?

A

Dynamic ARP inspection (DAI)

35
Q

What is a zero-day exploit?

A

When a new network vulnerability is found before a fix is available

36
Q

How can you control which devices can talk to a CPU?

37
Q

What is access-class used for?

A

To tie an ACL to vty lines

38
Q

What is access-group used for?

A

To tie an ACL to an interface

39
Q

Where do you want to configure extended access lists?

A

As close to the source as possible

40
Q

What does implicit deny refer to?

A

If any ACL is configured, its the invisible “deny all” at the end

41
Q

What is the standard ACL range and extended range?

A

1-99
1300-1999

42
Q

Where do you want to configure standard access lists?

A

Closest to the destination

43
Q

How do you configure a standard access list?

A

access-list n [permit/deny] [source address] [wildcard]

44
Q

How do you configure an ACL to block or forward data?

A

ip access-group [acl#] [in/out]

45
Q

How can you verify if an access-group is configured?

A

show ip interface

46
Q

How do you configure an extended access list?

A

access-list n [permit/deny] [protocol] [source/wild] [destination/wild] [port number]

47
Q

What is the extended ACL range and extended range?

A

100-199
2000-2699

48
Q

What additional things can you configure extended ACLs for over standard ACLs?

A

Destination IP
Port numbers

49
Q

What command is used to edit existing ACLs?

A

ip access-list [extended] n

50
Q

What command can you use to verify ACL configuration?

A

show ip access-lists
show access-lists

51
Q

For DHCP snooping, what interface should be configured as trusted on a switch?

A

The one connected to the DHCP server

52
Q

What can be done to mitigate VLAN hopping?

A

Put access ports in use into a VLAN that isn’t the native VLAN
Manually configure trunks and disable DTP

53
Q

How can you configure port security to dynamically learned MAC addresses?

A

switchport port-security mac-address sticky

54
Q

How should port security be configured if you want logs generated?

A

switchport port-security violation restrict

55
Q

What does protect do in port security configuration?

A

Drops packets from unknown sources but does not increase the counter

56
Q

Which two modes of port security drop packets when receiving packets from an unknown source?

A

Restrict
Protect

57
Q

What is the difference between the shutdown and restrict commands in port security?

A

Both send traps, but restrict drops the packet and shutdown puts the interface in an err-disabled state upon receiving a packet from an unknown source

58
Q

What is the default behavior of port-security?

A

Only one MAC address can be learned and the default violation action is shutdown

59
Q

What encryption is applied with enable secret by default?

60
Q

How do you configure a Telnet password?

A

line vty 0 15
password [password]
[login]

61
Q

How do you configure a password for console login?

A

line console 0
password [password]
login

62
Q

What happens if enable password and enable secret are configured?

A

The password is ignored

63
Q

What configuration can you apply to encrypt a password?

A

service password-encryption

64
Q

How would you configure a SHA-256 password?

A

enable algorithm-type sha256 secret [password]

65
Q

What kind of attacks can be mitigated with user awareness or training?

A

Brute-force attacks
Pharming
Social engineering

66
Q

What kind of attacks can be mitigated with physical access control?

A

Burglary
Tailgating

67
Q

What does DAI filter?

A

ARP messages received on untrusted ports

68
Q

What kind of encryption does WEP use?

69
Q

What is CCMP?

A

Cipher Block Chaining Message Authentication Code Protocol
Part of the 802.11i standard, uses the AES cipher to encrypt data

70
Q

Which wireless security protocol has an optional 192-bit encryption?

A

WPA3 Enterprise

71
Q

What is the configuration needed for DAI?

A

DHCP snooping enabled
ip arp inspection vlan n
ip arp inspection trust

72
Q

What is the configuration needed for DHCP snooping

A

ip dhcp snooping
ip dhcp snooping vlan n
(config-if)ip dhcp snooping trust/untrust

73
Q

What types of WLC deployments are there?

A

Unified/Centralized
Cloud-Based
Embedded
Mobility Express

74
Q

What is backdoor malware?

A

A type of Trojan that allows attackers to gain remote access to a system by negating normal authentication procedures

75
Q

What is a feature of RSA?

A

Asymmetric encryption algorithm
Public-key cryptosystem

76
Q

What privilege level grants the user access to privilege-exec mode?

77
Q

What privilege level grants the user access to user-exec mode?