K04 - Network Device Security Concepts Flashcards
The three principles of network device security concepts are confidentiality, integrity, and availability. What model is used to illustrate and explain these principles?
cia triad model
True/False Disabling DP on non-management interfaces is a way to avoid CDP manipulation.
true
True/False Spoofing (DHCP / ARP) attacks and STP Attacks are types of brute force attacks.
false
When a station is able to access VLAN other than its own; this is known as:
__________ involves scanning a network for a list of ports that may identify devices responsible for routing.
- Routing
- Reconnaissance
- Detection
- Packet logging
Reconnaissance
___________ exploitation is taking advantage of a vulnerability within a router or causing it to perform in a manner not intended by the owner.
router
What is it called when an attacker floods the Content Addressable Memory (CAM) table with more MAC addresses than the switch can store?
MAC Flood
List the two modes associated with Unidirectional Link Detection (UDLD):
normal, agressive
A firewall can be identified by all of the following techniques EXCEPT:
- port scanning
- banner grabbing
- moonlighting
- firewalking
moonlighting
__________ is the process of identifying firewall devices through the analysis of data obtained by sniffing and scanning.
firewall enumeration
True/ False Since traceroute is 100% accurate, it is not necessary to use the Hping tool to help identify firewalls.
false
Firewall and Router Enumeration Countermeasures include all of the following EXCEPT:
- Dynamic ARP inspection
- Multi-factor authentication
- Promiscuous mode detection
- Using higher-end switches
Multi-factor authentication
True/ False Loop insulation prevents the switch from getting out of the blocking state to forwarding.
false
___________ is defined as a process which establishes an active connection to the target hosts to discover potential attack vectors in the system.
enumeration
Information gathering and enumeration can lead to all of the following EXCEPT:
- Implemented Security levels
- Routing policies and rules
- Data integrity
- Network addressing topologies
Data integrity
True / False It is not necessary to block further attempts after a certain number of failed attempts if the user has a strong password.
false
True / False It is not necessary to block further attempts after a certain number of failed attempts if the user has a strong password.
False
___________ exploitation involves taking advantage of vulnerabilities within a switch.
switch
Since both SSH versions 1 and 2 share the same set of vulnerabilities, both versions provide the same level of security.
false
True/False If the VTY lines have telnet enabled; an attacker is able to sniff the traffic due to data being sent clear text.
true
True / False Strong passwords can help deter successful brute force attacks.
true
True/False If an attacker discovers the physical address of a router, they can spoof routing information to the targets.
false
List the network security principle that matches the following definition: prevention of unauthorized access to sensitive information.
confidentiality
Which network security principle matches the following description: Obtained through maintaining hardware and software, adequate communication connections (bandwidth and balancers), backups.
availability