Security Fundamentals Flashcards

1
Q

VLAN hopping

A

An attacker sends double-tagged 802.1Q frames over a trunk link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAC flooding

A

An attacker sends traffic out every port on a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARP poisoning

A

An attacker intercepts traffic intended for another recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAC spoofing

A

An attacker identifies itself using the address of another host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DHCP spoofing

A

An attacker installs a rogue server on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A

Process of verifying a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorization

A

Process of giving individuals access to system objects based on their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Accounting

A

Process of keeping track of a user’s activity while accessing a network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AES

A

Advanced Encryption Standard is used by WPA2/WPA3 to protect confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enable secret command

A

In Cisco IOS 15, this command stores an encrypted password in the device’s configuration file by using a Secure Hash Algorithm 256-bit hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Native VLAN Mismatch

A

Occurs when each end of an 802.1Q trunk port is operating with a different native VLAN. It can cause a port to go into error-disabled state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Service password-encryption command

A

Configures global password encryption in a running configuration. Any passwords that were not previously encrypted will be encrypted alongside any passwords that are created in the future regardless of the commands used to create them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

enable password command

A

Passwords configured using this command are not encrypted by default. You issue the enable password command to create a password that must be used to gain access to CLI enable mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

password command

A

Passwords configured by using the password command are not encrypted by default. The line console 0 command followed by the password command configures a password for accessing the router by using the console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CCKM key management

A

Cisco Centralized Key Management is a proprietary fast-rekeying method that enables a wireless client to roam from one access point to another without requiring intervention from the WLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.1X key management

A

Is a method of port-based network access control, which is the default on WLANs for WPA or WPA2 security. It typically requires RADIUS and uses various Extensible Authentication Protocol (EAP) implementations to authenticate users (WPA Enterprise)

17
Q

RC4 Encryption

A

Is used in the Wired Equivalent Privacy (WEP). Is less secure than Advanced Encryption Standard (AES), which is used by WPA2/WPA3. RC4 supports an encryption key of up to 128 bits

18
Q

Steps in site-to-site VPN IPSec encryption process

A
  • Sending device combines a session key with the data that is to be transported. It then uses the session key to encrypt both of them
  • Sending device encapsulates the encrypted data and the key into a packet with a VPN header and a new IP header
  • Sending device sends the complete packet to the destination device
19
Q

ACLs

A

ACLs are used to control packet flow into and out of a router. They can either permit or deny packets based on source network address, destination network address, protocol or port. When multiple ACLs that use the same protocol are applied to an interface, only the last ACL applied to the interface will affect traffic on that interface

20
Q

RC4 Encryption

A

Is a stream cipher encryption algorithm used in Wired Equivalent Privacy (WEP) protocol. Is less secure than Advanced Encryption Standard (AES) because only supports a key of up to 128 bits.