Network Security Flashcards

1
Q

Access Control Entry (ACE)

A

An individual rule found within an Access Control List (ACL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control List (ACL)

A

A set of rules that define how to allow or deny traffic at the router interface, based on specific criteria. ACLs can also be used to match traffic for classification and QoS purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Amplified Denial of Service (DoS) Attack

A

A type of DoS attack where an attacker exploits weaknesses in domain name system (DNS) servers in order to send a large amount of DNS record information to a target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ARP Poisoning

A

A tactic used in man-in-the-middle attacks where a threat actor sends gratuitous ARP replies to a client system, in an attempt to convince the client system to send frames destined for its default gateway to the attacker’s computer instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Brute Force

A

An attack where a series of consecutive strings (referred to as a dictionary) are used in an attempt to find a password or key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a deauthentication attack

A

An attack where a malicious user sends a deauthentication frame along with a spoofed IP address to a wireless access point, which causes a legitimate user to be dropped form the wireless network and forced over to a rogue access point instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Denial of Service (DoS) Attack

A

An attack where a targeted system is overwhelmed with a large volume of requests, causing it to consume resources to the point where it can’t perform its intended function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DHCP Snooping

A

A Layer 2 security feature that is used to detect and drop traffic from unauthorized DHCP servers on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DHCP Spoofing Attack

A

An attack where a malicious user has a rogue DHCP server that responds to DHCP Discover messages sent from a legitimate DHCP client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Distributed Denial of Service Attack (DoS)

A

A type of DoS attack where multiple compromised systems are used together in order to attack a target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS Poisoning

A

When an attacker advertises incorrect domain name resolution information into a DNS server, causing DNS requests to resolve to a compromised system instead of a legitimate one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dynamic ARP Inspection (DAI)

A

A security feature that rejects invalid and malicious ARP packets, preventing circumstances such as Man-in-the-Middle attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Evil Twin

A

A rogue access point appearing to be a legitimate wireless access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Extended Access Control List (ACL)

A

A type of ACL that provides greater control over traffic than a standard ACL by allowing traffic prioritization based on source and destination IP address, source and destination port, or protocol ID. These types of ACLs should be placed as close to the destination as possible. 100-199, 2000-2699

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Insider Threat

A

A security risk that originates from within the organization itself, such as current or former employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Logic Bomb

A

A malicious piece of code that can perform some destructive action based on a time or an event that occurs.

17
Q

MAC Flooding Attack

A

A type of network attack where an attacker floods a switch with a large number of Ethernet frames from spoofed source MAC addresses, in an attempt to fill up the switch’s Content Addressable Memory (CAM) table.

18
Q

Man-in-the-Middle Attack

A

An attack where a malicious user somehow injects themselves inside a communication flow between two systems, enabling them to intercept that flow’s traffic.

19
Q

Named Access Control List (ACL)

A

A feature of Cisco IOS that allows for intuitive naming of an ACL, rather than simply being identified by a number. This can be applied to either standard or extended ACLs.

20
Q

Phishing

A

Attempts to obtain confidential information by leveraging resources that look to be legitimate, such as fake websites or spoofed e-mail.

21
Q

Port Security

A

A Layer 2 traffic control feature that allows for the restriction of switch ports, ensuring that they are only associating with specified, allowed MAC addresses.

22
Q

Ransomware

A

Malware that prevents users from accessing their data unless they pay a ransom.

23
Q

Reflective Denial of Service (DoS) Attack

A

A type of DoS attack where an attacker hides their identity by spoofing their IP address, sending requests to third-party devices in order to cause them to respond to the target system.

24
Q

Social Engineering

A

Methods for influencing others to reveal confidential data, such as passwords or financial information.

25
Q

Spoofing

A

Methods used by attackers to falsifying information in an attempt to conceal their true identify, or to appear as a legitimate user on a target network or system.

26
Q

Standard Access Control List (ACL)

A

A type of ACL that allows traffic prioritization based only on the source IP address. These types of ACLs should be placed as close to the destination as possible. 1-99, 1300-1999

27
Q

VLAN Hopping

A

When a malicious user gets access to a normally restricted VLAN by either seeming to be connected to a trunk port or by double tagging the frame.

28
Q

War Driving

A

Driving around a geographical area in an attempt to find a wireless hotspot that can be accessed.

29
Q

What does password 7 {hash} command do?

A

configures an encrypted virtual terminal (VTY) login password when the command is issued in VTY line config mode.

30
Q

What does switchport port-security violation restrict command do?

A

When traffic from an unauthorized host arrives at the interface, traffic is discarded and incremented in the SecurityViolation counter

31
Q

What does switchport port-security violation protect command do?

A

When traffic from an unauthorized host arrives at the interface, traffic is discarded and the SecurityViolation is NOT incremented.

32
Q

What does switchport port-security violation shutdown command do?

A

When traffic from an unauthorized host arrives at the interface, port moves into err-disabled state and the SecurityViolation is incremented.