Network Monitoring Flashcards

1
Q

Network monitoring tools

A

Syslog. SNMP, Netflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common Layer 2 attacks

A
CDP Reconnaissance Attack
Telnet attacks
MAC address table flooding attack
VLAN attacks
DHCP attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collecting and displaying messages as they appear on a Cisco device console display

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A protocol used for Time Synchronization across devices in network monitoring.

A

NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A protocol that allows network devices to send its system messages across the network to syslog servers

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Used to manage IP network devices over the network with its rich set of data records and data trees to both retrieve and configure(change) information from networking devices & workstations.

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Log errors based on severity level 0 to 7 with level 0 as most severe

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Has 3 components

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SNMP commands

A

Get-request, set request, get bulk-requests, trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Components in SNMP

A

NetFlow, SPAN, IP SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Command to disable CDP globally

A

no cdp run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of telnet attacks

A

Brute Force password Attack

Telnet DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attacker exceeds the MAC address table capacity using fake MAC address causing the switch to be in fail-open mode and broadcasts all frames allowing the attacker to capture those frames

A

MAC address flooding attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attacker can gain VLAN access by configuring a host to spoof a switch and use the 802.1Q trunking protocol and DTP to trunk with the connecting switch

A

Vlan Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Methods to mitigate VLAN Attacks

A

Explicitly configure access links
Disable auto trunking
Manually enable trunk links
Implement port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of DHCP attacks

A

DHCP spoofing attack

DHCP starvation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Methods to mitigate DHCP attacks

A

configure DHCP snooping

configure port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ways to secure layer 2 of a network

A

use secure variants of protocols such as SSH,SCP,SSL
Use strong passwords and change often.
Enable CDP on select ports
Select telnet access

19
Q

Elements of SNMP

A

SNMP manager,, agents, Management Information Base (MIB)

20
Q

Collects information from an SNMP agent using the “get” action. Changes configurations on an agent using the “set” action

A

SNMP Manager

21
Q

manage the nodes

A

SNMP Agents

22
Q

Stores data and operational statistics about the managed device

A

Management Information Base (MIB)

23
Q

unsolicited messages alerting the SNMP manager to a condition or event such as improper user authentication or link status

24
Q

Types of community strings

A

Read only

Read write

25
Which SNMP version supports authentication and encrypts packets over the network to provide secure access to devices
SMNPv3
26
3 security feature in SNMPv3
Message integrity and authentication Encryption access control
27
Configuring community and access level in SNMP
snmp-server | community string ro | rw command
28
SNMP best practices
Use ACLs | Recommended due to security
29
Port mirroring allows a switch to copy and send ethernet frames from specific ports to the destination port connected to a packet analyzer
SPAN
30
What is an SNMP management agent?
software that is installed on devices managed by SNMP
31
What are the 2 span implementation?
Local Span | Remote Span
32
Traffic on a switch is mirrored to another port on that switch
Local SPAN
33
Allows source and destination ports to be in different switches
Remote SPAN
34
RSPAN Sessions
1 - used as the source | 2 - used to copy or receive the traffic from a VLAN
35
SNMP polling consume network resources (CPU& bandwidth) and slow in responses. Due to NMS periodically pools the SNMP agents resided on the managed devices
SNMP Traps
36
uses generated traffic to measure network performance bet devices across multiple networks and locations.
IP SLA
37
Collecting IP operational data from IP networks. or network and security monitoring, network planning, traffic analysis, and IP accounting
NetFlow
38
Network Documentation
logical topology diagram physical topology diagram end-system configuration files baseline performance level
39
Network performance baseline used for ?
Study/analyzing the network behavioral across different period time frame
40
two types of switch ports that are used on Cisco switches as part of the defense against DHCP spoofing attacks
untrusted port, trusted DHCP port
41
replying to GET request and SET request messages that are sent by an NMS
get-response
42
retrieving multiple rows in a table in a single transmission
get-bulk-request
43
Which protocol defines port-based authentication to restrict unauthorized hosts from connecting to the LAN through publicly accessible switch ports?
802.1x
44
Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?
SNMP