Cram Deck Flashcards

1
Q

A Type __ password is a cleartext password

A

Type 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Type 7 password is one that uses the algorithm from what cipher?

A

the Vigenere cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Enhanced Password Security feature can be used to configure ____ hashing of passwords for the username command

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISE aims to deliver what?

A

ISE aims to deliver consistent access control across multivendor networks (wired & wireless) and remote connections. It also aims to provide superior visibility into who is accessing your valuable network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What TCP areas other than TTL are often targeted by hackers?

A

Window Size, Don’t Fragment (DF) bit, Type of Service (TOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Managed devices serve what purpose?

A

Managed devices are those devices that are installed on different network segments for monitoring traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Memory Threshold Notification can mitigate what conditions?

A

low-memory conditions on a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are managed devices deployed?

A

Managed devices can be deployed passively to gather detailed information about the various network issues. They can also be deployed inline in order to affect the flow of traffic via access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

After a network address is subnetted the last subnet obtained is being referred to as:

A

all-ones subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What tool can you use to manage virtual managed devices?

A

Virtual managed devices do not have web interfaces - you need to use the CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You may use _________ to identify the type and rate of traffic that reaches the control plane of the router.

A

Control Plane Policing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To enable dynamic NAT on an interface, what must you define first (and what command would need to be used)?

A

standard IP access-list, using the access-list command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the context of FireSIGHT System, Network-based objects can represent:

A

IP addresses and networks, port/protocol pairs, VLAN tags, security zones, and geolocation …etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What tool can you use to manage ASA FirePOWER devices?

A

The ASA FirePOWER devices rely on their own management applications such as the ASDM and the CSM for configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You may prevent the router from sending ICMP redirects via what command?

A

no IP redirects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Control Plane Policing may be performed through the use of what?

A

Control Plane Policing may be performed through the use of granular classification ACLs, logging, as well as the use of the show policy-map control-plane command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is GTSM and what does it do?

A

Generalized TTL-based Security Mechanism is a TTL-based security protection method that uses the TTL value of IP packets for ensuring that the BGP packets received are from a directly connected peer which is real and legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Peer authentication via MD5 is desirable or not, and why?

A

Peer authentication via MD5 is desirable as it creates an MD5 digest of each packet that is sent as part of a BGP session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What command can you use to determine if IPS is currently configured?

A

show subsys name ips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Device stacking can be used to increase what?

A

Device stacking can be used to increase what?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What command can you use to look into the contents of the ARP cache and sort out all IP entries?

A

show ip arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

To allow hosts with no knowledge of routing to determine the MAC addresses of hosts on other networks, you need to use:

A

ip proxy-arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You may use __________ to create an IPS rule.

A

You may use __________ to create an IPS rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You may create a mobility area with a router via what command?

A

ip mobile arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is TVR and what is it for?

A

Target Value Rating TVR is what is used for developing security policies that can be stricter for some resources than others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What refers to feedback that can be used for controlling the level in which a user chooses to take actions for minimizing false positives?

A

Event Risk Rating ERR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The default behavior for IP directed broadcasts can be changed via what command?

A

ip directed-broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You can use what command to specify a broadcast address which is different from the default one?

A

ip broadcast-address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The FireSIGHT System can accommodate named objects. What are these objects?

A

They are a form of reusable configuration.

30
Q

LEAP was eventually replaced by what?

A

PEAP

31
Q

LCP is responsible for:

A

establishing, setting-up, and terminating point-to-point links

32
Q

With ___________ there is a dedicated VLAN created to trunk mirrored packets between two switches.

A

RSPAN

33
Q

With Local SPAN, where are the destination and source ports located?

A

on the same local switch

34
Q

Configuration revision number is carried by what advertisement?

A

VTP advertisement

35
Q

You use __________ to enable authentication proxy for AAA.

A

aaa authorization auth-proxy default

36
Q

A VLAN is identified with an ID number from 1 to _________ with the enhanced software image.

A

4094

37
Q

Your switch must be in _________mode in order to implement VLAN IDs from 1006 to 4094.

A

VTP transparent mode

38
Q

The IronPort ___-Series targets email security.

A

The IronPort C-Series

39
Q

You may want to statically assign which ports will become the member of your VLAN via the _____________ command.

A

vlan-membership

40
Q

LUN Masking is a process of what nature?

A

LUN Masking is an authorization process.

41
Q

With ISE, the possible personas include:

A

Administration, Policy Service, and Monitoring.

42
Q

To come up with a list of all VLAN IDs on a switch you need to use what command?

A

show running-config vlan

43
Q

What will happen when you have a VLAN deleted?

A

When you have a VLAN deleted, the ports assigned to that VLAN will become inactive but will remain associated with the VLAN until you manually assign them to another VLAN.

44
Q

In the context of ISE, a node refers to:

A

the individual instance that runs the Cisco ISE software.

45
Q

STP is intended for providing:

A

path redundancy (and preventing network loops)

46
Q

__________ can be constructed and applied to specific infrastructure related connections from hosts that need to access specific network infrastructure devices.

A

Infrastructure access control lists iACLs

47
Q

What feature is for protecting the Cisco 12000 routers’ gigabit route processor (GRP) from unnecessary and potentially dangerous traffics?

A

Receive ACLs

48
Q

Which firewall feature allows a packet to avoid redundant ACL checks?

A

Firewall ACL Bypass

49
Q

In order to define a reflexive access list, you need to create an entry in an extended named IP access list with the __________ keyword.

A

reflect

50
Q

You may use _____________ to enable TCP intercept.

A

ip tcp intercept list

51
Q

To enable Turbo ACL, you need to run the ___________ command in global configuration mode.

A

access-list compiled

52
Q

You can use _____________ to show issues that are preventing the routers from forming adjacency.

A

debug ip ospf adj

53
Q

_____________ is a definite course of action considered to be expedient, prudent or advantageous in guiding security.

A

policy

54
Q

___________ is a Cisco model that defines a structure of security objectives and supporting security actions for organizing security controls.

A

Cisco Security Control Framework SCF

55
Q

____________ describes a point in time measure of the security state of the concerned IT infrastructure.

A

Security Posture

56
Q

____________ aims to provide best practice information on designing and implementing secure networks.

A

Cisco’s secure blueprint for enterprise networks SAFE

57
Q

_____________ is for subdividing the infrastructure along different functional boundaries.

A

Functional Blocks

58
Q

What feature allows you to apply access control policies across multiple object groups?

A

PBACL

59
Q

VACL works at which layer (choose all that apply):

A

Filtering can be done either through a Layer 2 port or through a Layer 3 port after getting routed.

60
Q

PBACL works at which layer?

A

layer 3 only

61
Q

What is Security Intelligence feed?

A

A Security Intelligence feed is simply a dynamic collection of IP addresses downloaded at an interval you specify.

62
Q

Lock-and-key has to be configured via what kinds of access lists?

A

IP dynamic extended access lists

63
Q

Are Reflexive ACLs session filtering ACLs?

A

Yes.

64
Q

For the initial configuration of an ASA FirePOWER module, you should use what tool?

A

the CLI

65
Q

CAM table overflow can be mitigated via what measures?

A

One can flood the switch with invalid-source MAC addresses until the CAM table is full. Port security can be deployed against this attack.

66
Q

DHCP snooping aims to protect against what attack?

A

DHCP snooping aims to protect against rogue DHCP Servers.

67
Q

What command can you use to set a rate limit for DHCP snooping?

A

ip dhcp snooping rate

68
Q

What measures can be used against ARP Cache Poisoning and ARP Spoofing?

A

Dynamic ARP Inspection DAI

69
Q

What technique limits the ports within a VLAN that can communicate with other ports on the same VLAN?

A

Private VLAN

70
Q

STP root bridge attack can be defended against via what measures?

A

Configuring Rootguard and BPDUGuard on the switch port.

71
Q

With _____________, one configures a system to spoof as a switch by emulating either ISL or 802.1q signaling along with Dynamic Trunk Protocol DTP signaling.

A

switch spoofing