K04 - Network Device Security Concepts Flashcards

1
Q

The three principles of network device security concepts are confidentiality, integrity, and availability. What model is used to illustrate and explain these principles?

A

cia triad model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True/False Disabling DP on non-management interfaces is a way to avoid CDP manipulation.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True/False Spoofing (DHCP / ARP) attacks and STP Attacks are types of brute force attacks.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When a station is able to access VLAN other than its own; this is known as:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__________ involves scanning a network for a list of ports that may identify devices responsible for routing.

  • Routing
  • Reconnaissance
  • Detection
  • Packet logging
A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___________ exploitation is taking advantage of a vulnerability within a router or causing it to perform in a manner not intended by the owner.

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is it called when an attacker floods the Content Addressable Memory (CAM) table with more MAC addresses than the switch can store?

A

MAC Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the two modes associated with Unidirectional Link Detection (UDLD):

A

normal, agressive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A firewall can be identified by all of the following techniques EXCEPT:

  • port scanning
  • banner grabbing
  • moonlighting
  • firewalking
A

moonlighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__________ is the process of identifying firewall devices through the analysis of data obtained by sniffing and scanning.

A

firewall enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True/ False Since traceroute is 100% accurate, it is not necessary to use the Hping tool to help identify firewalls.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewall and Router Enumeration Countermeasures include all of the following EXCEPT:

  • Dynamic ARP inspection
  • Multi-factor authentication
  • Promiscuous mode detection
  • Using higher-end switches
A

Multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True/ False Loop insulation prevents the switch from getting out of the blocking state to forwarding.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___________ is defined as a process which establishes an active connection to the target hosts to discover potential attack vectors in the system.

A

enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Information gathering and enumeration can lead to all of the following EXCEPT:

  • Implemented Security levels
  • Routing policies and rules
  • Data integrity
  • Network addressing topologies
A

Data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True / False It is not necessary to block further attempts after a certain number of failed attempts if the user has a strong password.

A

false

17
Q

True / False It is not necessary to block further attempts after a certain number of failed attempts if the user has a strong password.

A

False

18
Q

___________ exploitation involves taking advantage of vulnerabilities within a switch.

A

switch

19
Q

Since both SSH versions 1 and 2 share the same set of vulnerabilities, both versions provide the same level of security.

A

false

20
Q

True/False If the VTY lines have telnet enabled; an attacker is able to sniff the traffic due to data being sent clear text.

A

true

21
Q

True / False Strong passwords can help deter successful brute force attacks.

A

true

22
Q

True/False If an attacker discovers the physical address of a router, they can spoof routing information to the targets.

A

false

23
Q

List the network security principle that matches the following definition: prevention of unauthorized access to sensitive information.

A

confidentiality

24
Q

Which network security principle matches the following description: Obtained through maintaining hardware and software, adequate communication connections (bandwidth and balancers), backups.

A

availability

25
Q

Which network security principle matches the following description: Can be obtained by training personnel on cyber security, strong passwords, encryption, two-factor authentication, biometrics, and security tokens.

A

confidentiality

26
Q

List the network security principle that matches the following definition: authorized access to information is consistent and readily accessible.

A

availability

27
Q

List the network security principle that matches the following definition: maintaining accuracy, consistency, and trustworthiness of the data’s life cycle.

A

integrity

28
Q

Which network security principle matches the following description: Examples include file permissions, user access controls (UAC), backups, checksums, and digital signatures.

A

integrity

29
Q

List the Firewall enumeration method that best matches the following description: enumerating the type of firewall being utilized by port numbers

A

port scanning

30
Q

List the Firewall enumeration method that best matches the following description: a method to discover metadata about a device.

A

banner grabbing

31
Q

List the Firewall enumeration method that best matches the following description: method of determining the movement of a data packet from an untrusted external host to a protected internal host through a firewall. A common technique is to craft packets with a TTL value set to expire one hop past a firewall.

A

firewalking

32
Q

List the Firewall enumeration method that best matches the following description: potential firewalls and routers are revealed by “request timed out” status.

A

traceroute