Security Fundamentals Flashcards
VLAN hopping
An attacker sends double-tagged 802.1Q frames over a trunk link
MAC flooding
An attacker sends traffic out every port on a switch
ARP poisoning
An attacker intercepts traffic intended for another recipient
MAC spoofing
An attacker identifies itself using the address of another host
DHCP spoofing
An attacker installs a rogue server on the network
Authentication
Process of verifying a user’s identity
Authorization
Process of giving individuals access to system objects based on their identity
Accounting
Process of keeping track of a user’s activity while accessing a network resources
AES
Advanced Encryption Standard is used by WPA2/WPA3 to protect confidentiality
Enable secret command
In Cisco IOS 15, this command stores an encrypted password in the device’s configuration file by using a Secure Hash Algorithm 256-bit hash
Native VLAN Mismatch
Occurs when each end of an 802.1Q trunk port is operating with a different native VLAN. It can cause a port to go into error-disabled state
Service password-encryption command
Configures global password encryption in a running configuration. Any passwords that were not previously encrypted will be encrypted alongside any passwords that are created in the future regardless of the commands used to create them
enable password command
Passwords configured using this command are not encrypted by default. You issue the enable password command to create a password that must be used to gain access to CLI enable mode
password command
Passwords configured by using the password command are not encrypted by default. The line console 0 command followed by the password command configures a password for accessing the router by using the console
CCKM key management
Cisco Centralized Key Management is a proprietary fast-rekeying method that enables a wireless client to roam from one access point to another without requiring intervention from the WLC
802.1X key management
Is a method of port-based network access control, which is the default on WLANs for WPA or WPA2 security. It typically requires RADIUS and uses various Extensible Authentication Protocol (EAP) implementations to authenticate users (WPA Enterprise)
RC4 Encryption
Is used in the Wired Equivalent Privacy (WEP). Is less secure than Advanced Encryption Standard (AES), which is used by WPA2/WPA3. RC4 supports an encryption key of up to 128 bits
Steps in site-to-site VPN IPSec encryption process
- Sending device combines a session key with the data that is to be transported. It then uses the session key to encrypt both of them
- Sending device encapsulates the encrypted data and the key into a packet with a VPN header and a new IP header
- Sending device sends the complete packet to the destination device
ACLs
ACLs are used to control packet flow into and out of a router. They can either permit or deny packets based on source network address, destination network address, protocol or port. When multiple ACLs that use the same protocol are applied to an interface, only the last ACL applied to the interface will affect traffic on that interface
RC4 Encryption
Is a stream cipher encryption algorithm used in Wired Equivalent Privacy (WEP) protocol. Is less secure than Advanced Encryption Standard (AES) because only supports a key of up to 128 bits.