K04 - Network Device Security Concepts Flashcards
The three principles of network device security concepts are confidentiality, integrity, and availability. What model is used to illustrate and explain these principles?
cia triad model
True/False Disabling DP on non-management interfaces is a way to avoid CDP manipulation.
true
True/False Spoofing (DHCP / ARP) attacks and STP Attacks are types of brute force attacks.
false
When a station is able to access VLAN other than its own; this is known as:
__________ involves scanning a network for a list of ports that may identify devices responsible for routing.
- Routing
- Reconnaissance
- Detection
- Packet logging
Reconnaissance
___________ exploitation is taking advantage of a vulnerability within a router or causing it to perform in a manner not intended by the owner.
router
What is it called when an attacker floods the Content Addressable Memory (CAM) table with more MAC addresses than the switch can store?
MAC Flood
List the two modes associated with Unidirectional Link Detection (UDLD):
normal, agressive
A firewall can be identified by all of the following techniques EXCEPT:
- port scanning
- banner grabbing
- moonlighting
- firewalking
moonlighting
__________ is the process of identifying firewall devices through the analysis of data obtained by sniffing and scanning.
firewall enumeration
True/ False Since traceroute is 100% accurate, it is not necessary to use the Hping tool to help identify firewalls.
false
Firewall and Router Enumeration Countermeasures include all of the following EXCEPT:
- Dynamic ARP inspection
- Multi-factor authentication
- Promiscuous mode detection
- Using higher-end switches
Multi-factor authentication
True/ False Loop insulation prevents the switch from getting out of the blocking state to forwarding.
false
___________ is defined as a process which establishes an active connection to the target hosts to discover potential attack vectors in the system.
enumeration
Information gathering and enumeration can lead to all of the following EXCEPT:
- Implemented Security levels
- Routing policies and rules
- Data integrity
- Network addressing topologies
Data integrity