Network Monitoring Flashcards

1
Q

Network monitoring tools

A

Syslog. SNMP, Netflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common Layer 2 attacks

A
CDP Reconnaissance Attack
Telnet attacks
MAC address table flooding attack
VLAN attacks
DHCP attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collecting and displaying messages as they appear on a Cisco device console display

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A protocol used for Time Synchronization across devices in network monitoring.

A

NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A protocol that allows network devices to send its system messages across the network to syslog servers

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Used to manage IP network devices over the network with its rich set of data records and data trees to both retrieve and configure(change) information from networking devices & workstations.

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Log errors based on severity level 0 to 7 with level 0 as most severe

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Has 3 components

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SNMP commands

A

Get-request, set request, get bulk-requests, trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Components in SNMP

A

NetFlow, SPAN, IP SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Command to disable CDP globally

A

no cdp run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of telnet attacks

A

Brute Force password Attack

Telnet DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attacker exceeds the MAC address table capacity using fake MAC address causing the switch to be in fail-open mode and broadcasts all frames allowing the attacker to capture those frames

A

MAC address flooding attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attacker can gain VLAN access by configuring a host to spoof a switch and use the 802.1Q trunking protocol and DTP to trunk with the connecting switch

A

Vlan Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Methods to mitigate VLAN Attacks

A

Explicitly configure access links
Disable auto trunking
Manually enable trunk links
Implement port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of DHCP attacks

A

DHCP spoofing attack

DHCP starvation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Methods to mitigate DHCP attacks

A

configure DHCP snooping

configure port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ways to secure layer 2 of a network

A

use secure variants of protocols such as SSH,SCP,SSL
Use strong passwords and change often.
Enable CDP on select ports
Select telnet access

19
Q

Elements of SNMP

A

SNMP manager,, agents, Management Information Base (MIB)

20
Q

Collects information from an SNMP agent using the “get” action. Changes configurations on an agent using the “set” action

A

SNMP Manager

21
Q

manage the nodes

A

SNMP Agents

22
Q

Stores data and operational statistics about the managed device

A

Management Information Base (MIB)

23
Q

unsolicited messages alerting the SNMP manager to a condition or event such as improper user authentication or link status

A

Traps

24
Q

Types of community strings

A

Read only

Read write

25
Q

Which SNMP version supports authentication and encrypts packets over the network to provide secure access to devices

A

SMNPv3

26
Q

3 security feature in SNMPv3

A

Message integrity and authentication
Encryption
access control

27
Q

Configuring community and access level in SNMP

A

snmp-server

community string ro | rw command

28
Q

SNMP best practices

A

Use ACLs

Recommended due to security

29
Q

Port mirroring allows a switch to copy and send ethernet frames from specific ports to the destination port connected to a packet analyzer

A

SPAN

30
Q

What is an SNMP management agent?

A

software that is installed on devices managed by SNMP

31
Q

What are the 2 span implementation?

A

Local Span

Remote Span

32
Q

Traffic on a switch is mirrored to another port on that switch

A

Local SPAN

33
Q

Allows source and destination ports to be in different switches

A

Remote SPAN

34
Q

RSPAN Sessions

A

1 - used as the source

2 - used to copy or receive the traffic from a VLAN

35
Q

SNMP polling consume network resources (CPU& bandwidth) and slow in responses. Due to NMS periodically pools the SNMP agents resided on the managed devices

A

SNMP Traps

36
Q

uses generated traffic to measure network performance bet devices across multiple networks and locations.

A

IP SLA

37
Q

Collecting IP operational data from IP networks. or network and security monitoring, network planning, traffic analysis, and IP accounting

A

NetFlow

38
Q

Network Documentation

A

logical topology diagram
physical topology diagram
end-system configuration files
baseline performance level

39
Q

Network performance baseline used for ?

A

Study/analyzing the network behavioral across different period time frame

40
Q

two types of switch ports that are used on Cisco switches as part of the defense against DHCP spoofing attacks

A

untrusted port, trusted DHCP port

41
Q

replying to GET request and SET request messages that are sent by an NMS

A

get-response

42
Q

retrieving multiple rows in a table in a single transmission

A

get-bulk-request

43
Q

Which protocol defines port-based authentication to restrict unauthorized hosts from connecting to the LAN through publicly accessible switch ports?

A

802.1x

44
Q

Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?

A

SNMP