Cisco chapter 10-13 Flashcards

1
Q

Common Network Attacks

A
  1. Distributed Denial of Service (DDos)
  2. Data Breach
  3. Malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VPN Router

A

A VPN-enabled router provides a secure connection to remote users across a public network and into the enterprise network. VPN services can be integrated into the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Next-Generation Firewall (NGFW)

A

An NGFW provides stateful packet inspection, application visibility and control, a next-generation intrusion prevention system (NGIPS), advanced malware protection (AMP), and URL filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Endpoints

A

Laptops, Desktops, Servers, Tablets, Phones, and BYODs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Access Control (NAC)

A

A NAC device includes authentication, authorization, and accounting (AAA) services. In larger enterprises, these services might be incorporated into an appliance that can manage access policies across a wide variety of users and device types. The Cisco Identity Services Engine (ISE) is an example of a NAC device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Functions of Cisco Email Security Appliance (ESA)

A
  1. Block known threats
  2. Remediate against stealth malware that evaded initial detection.
  3. Discard emails with bad links
  4. Block access to newly infected sites
  5. Encrypt content in outgoing email to prevent data loss
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cisco Web Security Appliance WSA

A

Controls how users access the internet. Can block messaging, video, audio or restrict them. Can also blacklist URLs, filter URLs, scan for malware, categorize URLs, filter web applications, and encrypt and decrypt traffic over the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication with Local Password

A

Using a password to log in to the switch and SSH for remote login can be helpful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AAA

A
  1. Authentication
  2. Authorization
  3. Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication

A
  1. Local Authentication - usernames and passwords are stored in the network device itself.
  2. Server-based authentication - server stores log in info and the network device accesses it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authorization

A

Is automatic and does not require the users to perform additional steps for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Accounting

A

Collects ad reports user data. It also is used in authentication to log what users did while on the network. This can help identify when users performed malicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IEE 802.1 X

A

A port-based access control and authentication protocol that restricts unauthorized workstations from connecting to a LAN through public switch ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC Table Attacks

A

Includes MAC address flooding attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VLAN Attacks

A

Includes VLAN hopping and VLAN double-tagging attacks. It also includes attacks between devices on a common VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DHCP Attacks

A

Includes DHCP starvation and DHCP spoofing attacks.

17
Q

ARP Attacks

A

Includes ARP spoofing and ARP poisoning attacks.

18
Q

Address Spoofing Attacks

A

Includes MAC address and IP address spoofing attacks.

19
Q

STP Attacks

A

Includes Spanning Tree Protocol manipulation attacks.

20
Q

Layer 2 Attack Mitigation

A
  1. Port Security
  2. DHCP Snooping
  3. Dynamic ARP Inspector DAI
  4. IP Source Guard IPSG
21
Q

Common ways to secure unused ports on a layer 2 switch

A

Turn them off

22
Q

Common ways to prevent MAC address attacks

A

Enable Port security

23
Q

What commands do you use to enable port security?

A
  1. Interface f0/#
  2. switchport mode access
  3. switchport port-security
  4. end
24
Q

Learning and Limiting MAC address

A
  1. Manually entered - assign static MAC addresses
  2. Dynamically Learned - current MAC address is secured unless the switch reboots.
  3. Dynamically Learned -Sticky - sticks Mac address to the running config
25
Q

Port Security Aging

A
  1. Absolute-secured address is deleted after a certain amount of time
  2. Inactivity - the secured address is deleted only if they are inactive for a specified amount of time.
26
Q

Parameters for port security aging

A
  1. Static - Enable aging for a statically configured secure address on this port
  2. time time - Specify the aging time for this port
  3. type absolute - set the absolute aging time
  4. type inactivity - set inactivity aging time.
27
Q

Security Violation Modes on a layer 2 switch

A
  1. Shutdown(default) - when a new address is discovered, the port shuts down. Must toggle to reactivate.
  2. Restrict - drops the packets and must remove mac addresses on the table to allow them to pass. Generates a sys log
  3. Protect - this is the least secure. It does the same as restrict but does not generate a sys log or increase the violation counter
28
Q

Types of Vlan attacks

A
  1. Vlan Spoofing- DTP messages can be sent by the attacker to have the switch enter trunk mode and allow them to target Vlans.
  2. Vlan hopping - double tagging a frame with two Vlan-ids. The example used an 802.1Q frame
29
Q

How to Mitigate Vlan Attacks

A
  1. Disable DTP
  2. Diable unused ports and put them on an unused Vlan