day 8 Flashcards

1
Q

Cisco’s 3 layer hierarchical model

A

a 3 layer logical (not necessarily physical) model, that may or may not be in different devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Core layer

A

only purpose of the core layer is to switch traffic as fast as possible throughout the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

distribution layer

A

the communication layer between the Core and Access Layers where network security is generally provided.

ACL’s, firewalls, and address translation are implemented at this layer. DMZ’s are implemented at this layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

access layer

A

controls user and workgroup access to network resources, most of which will be available locally.

The organizations trusted network.
Switch port and VLAN security should be implemented at this layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

layered security

A

physical integrity, core configuration, dynamic configuration, network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

physical integrity

A

routers are vulnerable to attackers with full physical access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

core configuration

A

the stored software and configuration state of the router itself.
Some items stored in core configurations are interface addresses, static routes, usernames, passwords, and privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

dynamic configuration

A

routing tables, ARP tables, and audit logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

network traffic

A

the information that routers manage, forward, and filter, such as permitted protocols and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

physical security

A

physical security not only covers unauthorized access, but also environmental protection and catastrophic events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

rooms containing routers should:

A
  • be free of electrostatic or magnetic inteference
  • have temperature and humidity controls
  • have an uninterruptible power supply
  • contain spare components/parts to speed repairs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

more on security

A

-devices should have the max amount of memory possible. This protects against DOS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IOS updates

A

new versions of IOS are important to have because they fix bugs and vulnerabilities, but don’t get the newest version until it has been vetted and checked out by other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Switch security best practices:

A
  • control STP by using BDPU guard and root guard
  • Turn off all unused ports an dassign them to an unused VLAN
  • Do not use VLAN 1 (avoid all defaults)
  • Designate an unused VLAN (other than VLAN 1) for the trunk native VLAN
  • Manually configure access ports and disable trunk negotiation
  • Enable port security to limit MAC addresses
  • disable CDP ports on facing unknown networks and links without Cisco neighbors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spanning Tree protocol security

A

BPDU Guard service is a way of preserving the STP topology by preventing the processing of any BPDU’s received on a port.

Root Guard provides a way to enforce the root bridge placement in the network, by not allowing a port to become a root port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dynamic Trunking Protocol (DTP)

A

used to negotiate trunking on VLAN aware switches