Module 10 Flashcards

1
Q

What does AAA stand for in network security?

A

Authentication, Authorization, Accounting

AAA provides a framework for network access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Local AAA Authentication?

A

Stores usernames and passwords locally in a network device

Ideal for small networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Server-Based AAA Authentication?

A

Router accesses a central AAA server using RADIUS or TACACS+ protocols

More appropriate for networks with multiple devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of AAA Authorization?

A

Governs what users can and cannot do on the network after authentication

Uses attributes to determine user privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does AAA Accounting do?

A

Collects and reports usage data for auditing or billing

Logs data such as connection times and executed commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the IEEE 802.1X standard?

A

A port-based access control and authentication protocol

Restricts unauthorized workstations from connecting to a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What roles do devices play in 802.1X authentication?

A

Client (Supplicant), Switch (Authenticator), Authentication Server

Each has a specific function in the authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What types of attacks are categorized under Layer 2 Security Threats?

A

MAC Table Attacks, VLAN Attacks, DHCP Attacks, ARP Attacks, Address Spoofing Attacks, STP Attacks

These attacks exploit vulnerabilities at Layer 2 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a MAC Address Table Attack?

A

Involves flooding a switch with fake source MAC addresses until the table is full

This can disrupt normal network operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a VLAN Hopping Attack?

A

Enables traffic from one VLAN to be seen by another VLAN without a router

This attack can compromise network segmentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is DHCP Snooping?

A

A security feature that prevents DHCP starvation and DHCP spoofing attacks

Helps to secure DHCP operations on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Dynamic ARP Inspection (DAI)?

A

Prevents ARP spoofing and ARP poisoning attacks

It verifies ARP packets on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IP Source Guard (IPSG)?

A

Prevents MAC and IP address spoofing attacks

It ensures that only valid IP addresses are used on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: Layer 2 vulnerabilities can affect all layers above it.

A

True

Compromise at Layer 2 can render security measures at higher layers ineffective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the function of a Next-Generation Firewall (NGFW)?

A

Provides stateful packet inspection and advanced malware protection

It integrates multiple security functions into one device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: The primary use of AAA accounting is to combine it with AAA _______.

A

authentication

This provides a log of user actions and helps in auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the Cisco Email Security Appliance (ESA) do?

A

Monitors SMTP, blocks known threats, and encrypts outgoing email

It uses real-time threat intelligence to enhance email security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the Cisco Web Security Appliance (WSA) provide?

A

Mitigation technology for web-based threats and application visibility

It controls web traffic based on organizational policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Port Security?

A

Prevents MAC address flooding attacks and DHCP starvation attacks

It limits the number of MAC addresses that can be learned on a port.

20
Q

What is an example of an attack that can be mitigated by implementing BPDU Guard?

A

STP Attack

BPDU Guard protects against manipulation of the Spanning Tree Protocol.

21
Q

What is IP address spoofing?

A

IP address spoofing is when a threat actor hijacks a valid IP address of another device on the subnet or uses a random IP address.

22
Q

How can IP and MAC address spoofing be mitigated?

A

Implementing IP Source Guard (IPSG).

23
Q

What is a STP attack?

A

A STP attack involves threat actors manipulating Spanning Tree Protocol (STP) to spoof the root bridge and change the topology of a network.

24
Q

How can STP attacks be mitigated?

A

By implementing BPDU Guard on all access ports.

25
Q

What information does CDP provide?

A

CDP provides the IP address of the device, IOS software version, platform, capabilities, and the native VLAN.

26
Q

How can the exploitation of CDP be mitigated?

A

Limit the use of CDP on devices or ports.

27
Q

What is a DHCP starvation attack?

A

An attack that aims to create a DoS for connecting clients by leasing all available IP addresses with bogus MAC addresses.

28
Q

What is a rogue DHCP server?

A

A rogue DHCP server provides false IP configuration parameters to legitimate clients.

29
Q

What types of misleading information can a rogue DHCP server provide?

A

It can provide:
* Wrong default gateway
* Wrong DNS server
* Wrong IP address

30
Q

What is ARP spoofing?

A

ARP spoofing is when an attacker sends a gratuitous ARP message containing a spoofed MAC address to a switch, allowing for a man-in-the-middle attack.

31
Q

How can ARP spoofing be mitigated?

A

By implementing Dynamic ARP Inspection (DAI).

32
Q

What is a MAC address table overflow attack?

A

An attack that floods a switch with fake source MAC addresses until the switch’s MAC address table is full.

33
Q

What happens when a switch’s MAC address table is full?

A

The switch treats incoming frames as unknown unicast and floods all traffic out all ports on the same VLAN.

34
Q

What is a VLAN hopping attack?

A

A VLAN hopping attack allows traffic from one VLAN to be seen by another VLAN without the aid of a router.

35
Q

What is a VLAN double-tagging attack?

A

An attack where a hidden 802.1Q tag is embedded inside a frame with another 802.1Q tag, allowing it to reach a different VLAN.

36
Q

How can VLAN hopping and double-tagging attacks be mitigated?

A

By implementing trunk security guidelines such as:
* Disable trunking on all access ports
* Disable auto trunking on trunk links
* Ensure the native VLAN is only used for trunk links.

37
Q

What command disables CDP globally on a device?

A

no cdp run

38
Q

What command enables CDP globally on a device?

A

cdp run

39
Q

What command disables CDP on a port?

A

no cdp enable

40
Q

What command enables CDP on a port?

A

cdp enable

41
Q

True or False: CDP information is sent in encrypted broadcasts.

A

False

42
Q

What tool can be used for DHCP starvation attacks?

A

Gobbler

43
Q

What does the Dynamic ARP Inspection (DAI) do?

A

DAI helps to prevent ARP spoofing and ARP poisoning.

44
Q

What is a gratuitous ARP?

A

An unsolicited ARP Reply sent by a client.

45
Q

Fill in the blank: The tool _______ can flood a switch with bogus frames to create a MAC address table overflow attack.

A

macof

46
Q

What is the primary function of DHCP servers?

A

To dynamically provide IP configuration information to clients.

47
Q

What is an example of a DHCP spoofing attack?

A

A rogue DHCP server providing an invalid IP address to clients.