Module 6.2 Flashcards

1
Q

Series of commands that control whether a device forwards or drops packets based on information found in the packet header

A

Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • They limit network traffic to increase network performance.
  • They provide traffic flow control.
  • They provide a basic level of security for network access.
  • They filter traffic based on traffic type
  • They screen hosts to permit or deny access to network services.
A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two types of Cisco IPv4 ACLs are

A

Standard and Extended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used to permit or deny traffic only from source IPv4 addresses. The destination of the packet and the ports involved are not evaluated.

A

Standard ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

filter IPv4 packets based on several attributes that include:

  • Protocol type
  • Source IPv4 address
  • Destination IPv4 address
  • Source TCP or UDP ports
  • Destination TCP or UDP ports
  • Optional protocol type information for finer control
A

Extended ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Can be created using either a number or a name to identify the ACL and its list of statements.

A

Standard and extended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Allows administrators to manage end devices such as servers, workstations, routers, switches, and security appliances, on an IP network.

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SNMP system consists of two elements

A
  • SNMP manager that runs SNMP management software
  • SNMP agents which are the nodes being monitored and managed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A database on the agents that stores data and operational statistics about the device.

A

Management Information Base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

part of a network management system (NMS).

A

SNMP manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

can collect information from an SNMP agent by using the “get” action and can change configurations on an agent by using the “set” action.

A

SNMP manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

can forward information directly to a network manager by using “traps”.

A

SNMP agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provides data to enable network and security monitoring, network planning, traffic analysis to include identification of network bottlenecks, and IP accounting for billing purposes

A

NetFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NetFlow technology distinguishes packet flows using a combination of seven fields:

A
  • Source IP address
  • Destination IP address
  • Source port number
  • Destination port number
  • Layer 3 protocol type
  • Type of Service (ToS) marking
  • Input logical interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Because network switches can isolate traffic, traffic sniffers or other network monitors, such as IDS, cannot access all the traffic on a network segment.

A

Packet analyzer (packet sniffer or traffic sniffer) limitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A feature that allows a switch to make duplicate copies of traffic passing through a switch, and then send it out a port with a network monitor attached. The original traffic is forwarded in the usual manner.

A

Port mirroring

17
Q

The most common method of accessing system messages.

A

Syslog protocol

18
Q

The syslog logging service provides three primary functions:

A
  • The ability to gather logging information for monitoring and troubleshooting
  • The ability to select the type of logging information that is captured
  • The ability to specify the destination of captured syslog messages
19
Q

Important to synchronize the time across all devices on the network. When the time is not synchronized between devices, it will be impossible to determine the order of the events that have occurred in different parts of the network.

A

Network Time Protocol (NTP)

20
Q

Allows routers on the network to synchronize their time settings with an NTP server.

A

NTP protocol

21
Q

NTP networks use a hierarchical system of time sources. Each level in this hierarchical system.

22
Q

NTP servers are arranged in three levels known as strata:

A

Stratum 0
Stratum 1
Stratum 2 and lower strata

23
Q

An NTP network gets the time from authoritative time sources. These authoritative time sources, also referred to as devices, are high-precision timekeeping devices assumed to be accurate and with little or no delay associated with them

24
Q

Devices are directly connected to the authoritative time sources. They act as the primary network time standard.

25
Q

Are connected to stratum 1 devices through network connections. Synchronize their time using the NTP packets from stratum 1 servers. They could also act as servers for stratum 3 devices.

A

Stratum 2 and lower strata

26
Q

Three independent security functions provided by the AAA architectural framework are

A

authentication, authorization, and accounting.

27
Q
  • Users and administrators must prove that they are who they say they are.
  • Can be established using username and password combinations, challenge and response questions, token cards, and other methods.
  • AAA provides a centralized way to control access to the network.
A

Authentication

28
Q
  • After the user is authenticated, services determine which resources the user can access and which operations the user is allowed to perform.
A

Authorization

29
Q
  • Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.
  • Keeps track of how network resources are used.
A

Accounting

30
Q

A private network that is created over a public network, usually
the internet. Uses virtual connections that are routed through the internet from the organization to the remote site.