Security Flashcards
What are the first steps in securing user EXEC access to allow for secure network device access?
Configure passwords for local and remote CLI sessions.
Which command option on remote CLI sessions is used to limit the session to use only a secure connection method?
transport input ssh
What protocol does TACACS+ use for communication between a TACACS+ client (network device) and a TACACS+ server?
TCP port 49
What are two of the high-level benefits of using a remote AAA server over local AAA services on each network device individually?
Scalability and standardized authentication methods using RADIUS and TACACS+
What type of passwords are not encrypted and are stored in plaintext in the device configuration? The enable password uses this type.
Type 0
What type of passwords use an MD5 hashing algorithm? These passwords are easily reversible with tools available on the Internet.
Type 5
The enable secret and username username secret commands use what type of passwords?
Type 5
What type of password encryption is enabled with the service password encryption command?
Type 7
What type of passwords use a Password-Based Key Derivation Function 2 (PBKDF2) with a SHA-256 hashed secret?
Type 8
What type of passwords use the SCRYPT hashing algorithm?
Type 9
What are the three ways to create a username on a cisco device?
Using the command username username password password configures a plaintext password (type 0).
Using the command username username secret password provides type 5 encryption.
Using the command username username algorithm-type [md5 | sha256 | scrypt] secret password provides type 5, type 8, or type 9 encryption, respectively.
To enable username and password authentication on a line, you need what two commands?
Create the user with the username command in global configuration mode, using one of the three options listed earlier in this section.
Use the login local command in line configuration mode.
What command allows you to enable password authentication on a line?
password
After you enable password authentication on a line, what command enables password checking?
login
What command allows for username/password pairs stored locally on the router to be used for the lines?
login local
What’s the difference between SSHv1 and SSHv2?
The SSHv2 enhancement for RSA supports RSA-based public key authentication for a client and a network device.
What three commands do you need to enable SSH?
hostname hostname
ip domain-name domain-name
crypto key generate rsa
What privilege level allows for the use of five commands: enable, disable, help, logout, and exit?
Privilege level 0
What privilege level is the user EXEC mode where it’s not possible to make configuration changes?
Privilege level 1
What what privilege level are all of the IOS CLI commands are available?
Privilege level 15
What command can you use to force the vty lines to only allow remote connections via a protocol that supports encryption?
transport input ssh
What type of encryption does the service password encryption command provide?
Type 7
True or false: SSH Version 1 implementation is compatible with SSH Version 2 implementation.
False
Which part of AAA provides identity verification before access to a network device is granted?
Authentication
Which part of AAA provides access control?
Authorization
Which part of AAA provides a method for collecting information, logging the information locally on a network device, and sending the information to an AAA server for billing, auditing, and reporting?
Accounting
What are some of the high-level benefits of using a remote AAA server over local AAA services?
Increased flexibility and control of access configuration
Scalability
Standardized authentication methods using RADIUS and TACACS+
Ease of setup, since RADIUS and TACACS+ may have already been deployed across the enterprise
More efficiency, since you can create user attributes once centrally and use them across multiple devices
What protocol allows for a single access control server to provide authentication, authorization, and accounting to the network access server (NAS) independently?
TACACS+
The TACACS+ protocol uses what port for communication between the TACACS+ client (network device) and the TACACS+ server?
TCP port 49
What are the two implementations of RADIUS?
Cisco’s implementation and the industry-standard implementation.
Which of the following is not one of the benefits of AAA?
A. Increased flexibility and control of access configuration
B. Scalability
C. Standardized authentication methods using RADIUS and TACACS+
D. Complete removal of the need for local user creation on IOS devices
D. Complete removal of the need for local user creation on IOS devices
In the industry-standard implementation of the RADIUS protocol, which port is used for accounting?
UDP port 1813
Which command is entered to enable AAA on a Cisco IOS device?
aaa new-model
Which of the following commands is used for configuring a vty line to use the method list name list1?
A. aaa authentication
B. aaa authorization
C. login authentication list1
D. aaa new-model
C. login authentication list1
To add a TACACS+ server in IOS 15.x, what command follows tacacs server name if the IP address is 10.10.10.10?
address ipv4 10.10.10.10
To add a TACACS+ server in IOS 15.x, you need to specify the TACACS+ server name, specify the server IP address with the address ipv4 ip address command (address ipv4 10.10.10.10 in this case), and then specify the key string.
What is one of the reasons you would use named access lists over numbered access lists?
Named access lists allow you to reorder statements in or add statements to an access list.