Part 2 Flashcards
What are networking devices that forward, filter, and flood packets between networks?
Routers
What is the feasibility of a path?
Cost
What is the first line of defense for the network?
Routers
What measures the distance based on number of networks a packet transverses?
Hop
What measures amount of bits per second capacity of each link in packet’s path?
Bandwidth
What measures amount of microseconds that the routers within the path take to process, queue, and transmit packets?
Delay
What measures the amount of attached links, link failures, errors, and lost packets, within the path?
Reliability
What exchange routing information from WAN to WAN?
Exterior Gateway Protocols
What is a link state routing protocol that calculates the shortest path to all destinations by lowest cost?
OSPF
What determines the path by using a combination of distance, or cost of reaching a destination, and the vector (interface that the traffic from which it will be forwarded) distance uses hop count as metric variable work by having each node share routing table information with its neighbors
Distance Vector Protocols
What is the original distance vector routing protocol used on smaller networks 15 hops or less?
Routing Information Protocol (RIP)
What is an upgraded version of the original distance vector protocol that includes additional information carried in RIP messages and the addition of security measures?
RIP version 2
What is the most commkn hybrid protocol?
EIGRP - Enhanced Intererior Gateway Protocol
What is a Exterior Gateway Protcol that provides interdomian routing between autonomous systems (ASs)?
Border Gateway Protocol (BGP)
What is an EXEC command used to display information about open Telnet or rlogin connections?
Show sessions
What are three modes for Port Security?
Protect mode
Restrict mode
Shutdown mode
What is propriety protocol that can only be used with other cisco routers and switches?
Cisco Discovery Protocol CDP
What allows ping and is vulnerable to DDOS attacks?
ICMP
What allows router to inform hosts of subnet mask information for a particular network segment?
ICMP Mask Reply
Most cisco routers are set by default to not send ICMP mask replies but explicitly using this setting in the config file alleviates doubt and makes auditing the router easier
No ip mask-reply
What are 4 default TCP and UDP services enabled (Small servers)?
Echo
Chargen
Discard
Daytime
No service tcp-small-services
No service udp-small-services
What ensures timely detection of connection failures by monitoring TCP sessions and helps prevent DOS attacks that are aimed at maxing out available VTP lines with fraudlent sessions?
Keep alives
Service tcp-keepalives -in
Enables this service
Where can I find router config help commands
Share drive routeracl.txt
What kind of ACLs are used in the fleet?
Extended
What are a group of statrments that define the handling of network packets?
ACLs
What do ACLs consist of?
Entering the inbound router
Being relayed through the router
Exiting the outbound router interface
What provides packet filtering for routers and firewalls to protect internal networks from internet and unprotected networks?
ACLs
What are parsed in sequential or logical form in order from top to bottom?
ACLs
What mode is an ACL created in?
Global Configuration Mode
What type of ACL is placed closest to the source of traffic?
Extended
What type of ACL is placed closest to the target?
Standard
What range is a Standard ACL?
1-99
1300-1999
What range is an extended ACL?
100-199
2000-2699
What are the classes of networks?
A - 1-126 B - 128-191 C - 192-223 D - 224-239 E - 240-255
What is the inverse of a subnet mask?
Wild card which indicates what part of the network is available.
How many TNOSCs are there?
3
Yokosuka
Naples
Bahrain
How many Local Network Service Centers (LNSCs)?
11
Asia and Europe
What services does the FLTNOC provide?
Email Web Cache Domain Name Service File Transfer Protocol Back Up and Restore Noc to Noc N2N fail over DISN Defense Information Security Network
Severity code 1 for securing virtualization means what?
Someone or something has immediate access to the machine
Severity code 2 for securing vitualization means what?
There is a high potential of allowing access to an intruder
Severity code 3 for securing virtual infrastructure means what?
Information has been found that there is a potential leading to a comprimise
Where is NCDOC based?
Suffolk
What is the Navy’s Cyber Security Service Provider?
NCDOC
What manages the roll up of sensory data throughout the fleet including ships, submarimes, and other shore activities?
NCDOC
What provides CND for secure DISN connectivity?
NCDOC
What partitions the server’s physical resources?
VMKernel Resource Manager
What is refered to as a hypervisor?
Virtual Machine Monitor
What is the core vSphere OS?
VMKernel
What is INFOCON 1?
Security baseline must be re established every 15 days and off line drills conducted every 15 days
What is INFOCON 2?
Security baseline must be re established every 30 days and off line drills conducted every 15 days
What is INFOCON 3?
Security baseline must be re established every 60 days and off line drills conducted every 30 days
What is INFOCON 4?
Security baseline must be re established every 90 days and off line drills conducted every 60 days
What is INFOCON 5?
Normal operations
What does RADIUS protocol stand for?
Remote Access Dial In User Service
protocols sent to AAA server for log generation
What are Audit trials used for?
Evidence and non repudiation
What checks the source address of routed IP packets and compares it against the statement defining the ACL?
Standard ACL
What gives permit or deny access for entire protocol suite (e.g. IP) based on network(s), subnet, or host addresses?
Standard ACL
What is aethod used to reduce the number of entries in an ACL and can create ACL and apply to all 16 IP subnets but must be in sequential order?
ACL summarizarion
What is used to handle synchronization of time and ensures captured logs are accurate?
Network Time Protocol - NTP
What are three types of logs on Cisco routers?
AAA
SNMP
System
What are the severuty codes for Cisco Logs?
0- emergency 1-alerts 2-critical 3-errors 4-warnings 5-notifications 6-informational 7-debugging