Device Security Flashcards

1
Q

What are the ranges for standard ACLs?

A

1-99

1300-1999

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Syntax for an extended numbered ACL

A

access-list access-list-number {deny | permit} protocol source IP wildcard mask destination IP wildcard mask [log]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 primary differences that named ACLs have vs numbered

A
  1. Names instead of numbers
  2. Uses ACL subcommands vs global commands to define the ACL
  3. ACL editing allows users to edit delete and add individual lines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Command to delete a line from a numbered ACL with sequence numbers.

A

conf t
ip access-list {standard | extended} number
no seq number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Syntax to assign an ACL to a vty

A

access-class number {in | out}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TCP version of an extended ACL

A

access-list access-list-number {deny | permit}tcp source source-wildcard [operator [port]] destination destination-wildcard [operator [port]] [log]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If an ACL omits the wildcard mask, what is the implied mask?

A

0.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the ranges for extended ACLs?

A

100 - 199

2000 - 2699

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Syntax for a standard numbered ACL

A

access-list {1-99 | 1300-1999} {permit | deny} [subnet wildcard mask | any ]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operational command to see: -IPv4 ACLs -All ACLs

A

show ip access-lists

show access-list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Command to see access list application status on an interface

A

show ip interface interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Keyword to add to an ACL to help keep track of it’s activity

A

log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 types of ACLs?

A

Standard
Extended
Named

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Are named ACLs standard or extended?

A

Either, depends on how they are configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between standard and extended ACLs?

A
Standard ACLs filter on source address
Extended ACLs filter on:    
  Source and Dest IP    
  Source and Dest Port    
  Other criteria
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do extended ACLs filter on?

A

Source & Dest. IP

Source & Dest. Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Command to implement an ACL on an interface

A

ip access-group number|name {in | out}

18
Q

ACL keyword that means “0.0.0.0” wildcard

A

host

19
Q

ACL keyword that means 0.0.0.0 255.255.255.255

A

any

20
Q

ACL keywords for
greater than
less than
equal to

A

gt
lt
eq

21
Q

Command to instantiate a named ACL

A

ip access-list {standard | extended} name

22
Q

If a numbered ACL doesn’t use sequence numbers, how would a user remove one of it’s lines?

A

They can’t. The ACL must be deleted and re-added entirely.

23
Q

What effect does the log keyword have on an ACL?

A

It sends messages to the log file about the activity pertinent to that line in the ACL

24
Q

What advantage does SNMPv3 have over older versions?

A

Security

25
Q

What 3 features in SNMPv3 support higher levels of security?

A
  1. Message integrity (tamper detection)
  2. Authentication
  3. Encryption
26
Q

What are the 3 security modes for SNMPv3?

A

noAuthNoPriv
authNoPriv
authPriv

27
Q

Configuration keyword for the noAuthNoPriv level of SNMPv3 security

A

noauth

28
Q

Configuration keyword for the authNoPriv level of SNMPv3 security

A

auth

29
Q

Configuration keyword for the authPriv level of SNMPv3 security

A

priv

30
Q

Command to see the status of the SSH service on the device

A

show ip ssh

31
Q

5 steps to enabling SSH

A
  1. Configure VTY lines to use either local or AAA security
  2. If local, add usernames
  3. Configure the ip domain-name
  4. Create the encryption key
  5. Enable version 1 or version 2
32
Q

Command to enable port security on an interface

A

switchport port-security

33
Q

2 mandatory and 4 optional steps to enabling port security

A
  1. Set a port to either trunk or access mode
  2. enable port security
    Optional
  3. Change the default number of MAC addresses allowed
  4. Change the default port security violation behavior
  5. Define any permitted MAC addresses
  6. Tell the switch to sticky-learn any dynamically learned mac addresses
34
Q

Command to see the security state of switch ports

A

show port-security [interface interface]

35
Q

What are the 3 port security violation options, and which is default?

A
  1. Shutdown (default)
  2. Protect
  3. Restrict
36
Q

3 steps to create a key for use in routing authentication

A
  1. Create the key chain
  2. Create the key
  3. Set the key string
37
Q

Syntax to create a key chain

A

conf t

key chain name

38
Q

Syntax to create a key under a key chain

A

key #

39
Q

Syntax to set a text string for a key

A

key-string text-string

40
Q

Command to create the encryption key for SSH

A

crypto key generate rsa

41
Q

Command to set the device to use SSH2

A

ip ssh version 2