cisco 10-13 Flashcards
What protocols are used by AAA to authenticate users against a central database of usernames and passwords
RADIUS, TACACS+
Authentication method that stores usernames and passwords in the router and is ideal for small networks
local AAA
Component of AAA used to determine which resources a user can access and which operations the user is allowed to perform
authorization
Component of AAA used to allow an administrator to track individuals who access network resources and any changes made
accounting
What device is considered a supplicant during the 802.1x authentication process
the client that is requesting authentication
Which access control component controls what users can do on the network
authorization
Access control component that audits what users actions are performed on the network
accounting
Access control component that restricts LAN access through publicly accessible switch ports
802.1x
Access control component that indicates success or failure of a client-requested service with a PASS or FAIL message
authorization
Access control component that is based on device roles of supplicant, authenticator, and authentication server
802.1x
Which two cisco solutions help prevent DHCP starvation attacks
DHCP snooping, port security
What is the result of a MAC table flooding attack
the switch will begin broadcasting traffic out of all ports
Which feature on a switch makes it vulnerable to VLAN hopping attacks
the automatic trunking port feature enabled by default
What makes switches vulnerable to double tagging attacks
native vlan of trunking port being same as user VLAN
Result of DHCP starvation attack
legitimate clients are unable to lease IP addresses
Best practice for CDP and LLDP
disable them where they aren’t required
Which port security configuration allows dynamically learned mac addresses to be saved in running config
sticky secure mac address
Which set of commands limits learned MAC addresses to 2, stores them in running config, and shuts the port down if there are more
switchport port-security, switchport port-security max 2, switchport port-security mac-address sticky
What happens with default port security when an extra mac is added
interface is shut down and log file is made
Default violation mode in port security
shutdown
Violation mode where packets are dropped without log message
protect
Exhibit of show port-security int f 0/. What can be determined?
Port violation mode is the default
Exhibit where Fa0/2 is down. Why?
MAC of PC1 configured on S1 isn’t the right MAC
Vlan hopping attack prevented by designating unused VLAN as native VLAN
VLAN double-tagging
3 Techniques to mitigate VLAN attacks
disable DTP, enable trunking manually, set native vlan to unused vlan
What is the effect of ip dhcp snooping limit rate 6
port can receive 6 DHCP discover messages per second
Purpose of ip arp inspection validate src-mac
checks source MAC in ethernet header against sender MAC in ARP body
Command to enable portfast on all ports by default
spanning-tree portfast default
Security benefit gained from enabling BPDU guard on PortFast-enabled devices
prevents rogue switches from being added to the network
Commands to enable BPDU guard
spanning-tree bpduguard enable (if), spanning-tree portfast bpduguard default (global)
Wireless network that uses transmitters to provide coverage over an extensive geographic area
WWAN
Wireless network that uses Bluetooth/ZigBee
WPAN
Wireless network over large urban region
WMAN
Wireless network for home network
WLAN
Wireless network that uses devices mounted on buildings
WMAN
Wireless network for global communication
WWAN
Wireless network for 300 ft
WLAN
Wireless network w/ 802.11 and uses 2.4/5ghz
WLAN
Wireless network suitable for city
WMAN
Wireless network w/ 20-30ft transmitters
WPAN
IEEE Standard 802.15
Bluetooth
802.11 standards that operate only in 5ghz range
802.11a, 802.11ac
802.11 standard that has <1.3gb/s data range and is backwards compatible
802.11ac
Wireless antenna best for large open spaces (hallways, conference rooms)
omnidirectional
Wireless network topology used by network engineers to provide wireless network for entire college building
infrastructure
Access point mode where hosts don’t see it in list of networks
Active mode
Access point mode where SSID is broadcast
passive mode
Management frame regularly broadcast by AP
beacons
Two methods used by wireless NIC to discover AP
transmitting probe request, receiving broadcast beacon frame
What does CAPWAP do
provides encapsulation and forwarding of wireless user traffic between AP and WLAN controller
Purpose of adjusting channel on wireless router
avoid interference from nearby wireless devices
Method to enhance performance of 802.11n wireless network
split traffic between 2.4 and 5 gHZ bands
Wireless security risk created by microwave ovens
accidental interference
Advantage of SSID cloaking
clients will have to manually identify the SSID to connect to the network
Wireless security mode that requires a RADIUS server
enterprise
What ports does radius use
1812, 1813, 1645, 1646
First security measure that should be applied on wireless router
change default username & password
3 parameters to change on home wireless ap
SSID, ap password, wireless network password
Which service is used on wireless router (that assigns IPs to hosts in the 10.10.10.0 network) to allow hosts to access the internet
NAT
Wireless router service that can be used to prioritize network traffic
QoS
Cisco 3504 WLC dashboard which option provides access to full menu of features
Advanced
Which protocol can be used to monitor the network
SNMP
Which server provides ability to authenticate with usernames and passwords
RADIUS
Purpose of shared secret password on WLC
used to encrypt messages between WLC and RADIUS server
What tab allows configuration of WLAN security options such as WPA2 on the summary page (Advanced > Summary)
WLANs
What is required before creating a new WLAN on WLC
create new VLAN
Troubleshooting steps to fix laptops that can’t connect to WAP
ensure NIC is enabled, ensure SSID is chosen
Why does switching to 5ghz make the network faster
more channels, less crowded
Simple way to improve WLAN performance thru split-the-traffic
make sure different SSIDs are used for 2.4 and 5ghz
How to make 802.11n/ac router faster
split traffic between 802.11n 2.4ghz band and 5ghz band