Cram Deck Flashcards
A Type __ password is a cleartext password
Type 0
A Type 7 password is one that uses the algorithm from what cipher?
the Vigenere cipher
The Enhanced Password Security feature can be used to configure ____ hashing of passwords for the username command
MD5
ISE aims to deliver what?
ISE aims to deliver consistent access control across multivendor networks (wired & wireless) and remote connections. It also aims to provide superior visibility into who is accessing your valuable network resources
What TCP areas other than TTL are often targeted by hackers?
Window Size, Don’t Fragment (DF) bit, Type of Service (TOS)
Managed devices serve what purpose?
Managed devices are those devices that are installed on different network segments for monitoring traffic
Memory Threshold Notification can mitigate what conditions?
low-memory conditions on a router
How are managed devices deployed?
Managed devices can be deployed passively to gather detailed information about the various network issues. They can also be deployed inline in order to affect the flow of traffic via access control.
After a network address is subnetted the last subnet obtained is being referred to as:
all-ones subnet
What tool can you use to manage virtual managed devices?
Virtual managed devices do not have web interfaces - you need to use the CLI
You may use _________ to identify the type and rate of traffic that reaches the control plane of the router.
Control Plane Policing
To enable dynamic NAT on an interface, what must you define first (and what command would need to be used)?
standard IP access-list, using the access-list command.
In the context of FireSIGHT System, Network-based objects can represent:
IP addresses and networks, port/protocol pairs, VLAN tags, security zones, and geolocation …etc.
What tool can you use to manage ASA FirePOWER devices?
The ASA FirePOWER devices rely on their own management applications such as the ASDM and the CSM for configuration.
You may prevent the router from sending ICMP redirects via what command?
no IP redirects
Control Plane Policing may be performed through the use of what?
Control Plane Policing may be performed through the use of granular classification ACLs, logging, as well as the use of the show policy-map control-plane command.
What is GTSM and what does it do?
Generalized TTL-based Security Mechanism is a TTL-based security protection method that uses the TTL value of IP packets for ensuring that the BGP packets received are from a directly connected peer which is real and legitimate.
Peer authentication via MD5 is desirable or not, and why?
Peer authentication via MD5 is desirable as it creates an MD5 digest of each packet that is sent as part of a BGP session.
What command can you use to determine if IPS is currently configured?
show subsys name ips
Device stacking can be used to increase what?
Device stacking can be used to increase what?
What command can you use to look into the contents of the ARP cache and sort out all IP entries?
show ip arp
To allow hosts with no knowledge of routing to determine the MAC addresses of hosts on other networks, you need to use:
ip proxy-arp
You may use __________ to create an IPS rule.
You may use __________ to create an IPS rule.
You may create a mobility area with a router via what command?
ip mobile arp
What is TVR and what is it for?
Target Value Rating TVR is what is used for developing security policies that can be stricter for some resources than others.
What refers to feedback that can be used for controlling the level in which a user chooses to take actions for minimizing false positives?
Event Risk Rating ERR
The default behavior for IP directed broadcasts can be changed via what command?
ip directed-broadcast
You can use what command to specify a broadcast address which is different from the default one?
ip broadcast-address