08 Flashcards

(45 cards)

1
Q

__________ stored software and configuration state of the router itself, contains interface addresses, static routes, usernames, passwords, and privileges

What is compromised once this is taken?

A

core configuration

Dynamic Configuration
Network Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__________ contains routing tables, ARP tables, and audit logs,
What is compromised once this is taken?

A

Dynamic configuration

Network Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_________ The information that routers manage, forward, and filter, such as permitted protocols and services

A

Network Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is compromised once physical security is compromised?

A

everything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stp Security

The _________________ is a way of preserving the STP topology by preventing the processing of any BDPUs received on a port. If a BDPU is received the port is automatically disabled and ports must be recovered manually

A

BDPU Guard Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___________ provides a way to enforce the root bridge placement in the network, by not allowing a port to become a root port

A

Root Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________ negotiates trunking on VLAN aware switches allowing switches to automatically learn and change port configurations based on the information gathered on each port.

A

DTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In terms of security what should you do with vlans?

A

shut down any unused and never use the default vlan 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How port security learns the valid Mac address

____________ manually configured by the administrator

___________ learned __________ for traffic. stored in the address table but not in the running config

__________ Manually configured or learned dynamically from traffic. Also stored in the running configuration. The running configuration is then saved, making the addresses static

A

Static

Dynamic

Sticky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port Security violation actions

___________ administratively disables the port. Must be brought back up manually

__________ Forwards allowed traffic, drops violating traffic and increments the port security violation counter. Can also send an SNMP trap and send logs to syslog.

_________ Like restrict, but without logging violations

A

Shutdown

Restrict

Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do I disable CDP on an interface/globally?

A

global mode: no cdp run
specific int: no cdp run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

________/________ Occurs when an attacker manipulates and falsifies information and is used to hide an attacker’s identity

A

Masquerading/Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ The exploitation of a valid computer session - sometimes also called a session key

A

Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ Includes manipulating router updates to cause traffic to flow to unauthorized destinations

A

Rerouting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ Refers to willful attempts to cause disruptions by overwhelming the targeted system.

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________ The unauthorized viewing and collection of network traffic

A

Eavesdropping and information theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port ___ Service _____ This command echoes back whatever is typed

A

7echo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Port __ Service ______ This service was originally designed to aid in troubleshooting links along a communications path.

A

9discard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Port _____ Service __________ This command returns system date and time

20
Q

Port ____ Service ________ generates a 72-charcter string of ASCII characters from the remote host.

21
Q

Service _____ Network hierarchy could be changed at layer 2 and loops introduced. Mitigate with BDPU guard and root guard

22
Q

Service ____ Vlan hopping attack

23
Q

Service _____ Gives too much information about neighbors

24
Q

Service _________ Port ______ enumeration of logged in users and correlated with time, when they are usually working.

25
Service ________ Port _______ Change system times, updates, logs, time based ACLs, syncing
UDP 123NTP
26
Service _________ Allows a device to load their configuration fro over the network. Posing as a BootP server allows an adversary to pass a config of their choosing, or DoS by denying one.
Boot Network
27
Service ___________ showing what is unreachable, and sometimes why. Service ______ informs a host that a packet was sent to the wrong destination, and tells the sending machine the correct destination Service _______ tells you that target networks size
Destination unreachable Ip redirect ICMP Mask reply
28
Service ______ DNS Poisoning
DNS lookups
29
Service _____ port ____ zero knowledge needed to configure a device, Could allow access to machine @ priv 15 with no username/pswd command:
80HTTP
30
Service _____ port _____ secure protocol zero knowledge needed to secure
TCP 443HTTPS
31
Service ______ specify the route a packet takes bypassing security measures and changes Source IP whcih can bypass ACLs
IP Source Routing
32
Service ______ V1&V2: sends packets in clear text V3: encrypted
SNMP
33
Service _______ enables a Cisco router to act as intermediary for ARP, breaking the LAN security perimeter allowing mac addresses too be sent past the switch onto the network
Proxy ARP
34
Service _________ permits a host on one LAN segment to send broadcast messages on a different LAN segment What vulnerability?
IP Directed Broadcast Smurf attack
35
Service _____ only forwards packets with valid addresses, Relies on CEF commands?
uRPF global config: ip cef specific int: ip verify unicast reverse-path
36
Service_____ port_____ is proprietary to MircoTik, it is a configuration and management software tool
TCP 8281WinBox
37
___________ involves a direct connection to the console port of a device with a terminal emulator program such as HyperTerminal, or dumb terminals
Local access
38
Password Recovery can only occur on a _________ port
Console Port
39
How do I enable SSH?
assign a domain name ip domian name jcac.net make account go into VTY lines 0 15 Login local transport input none transport input ssh
40
___________ logs errors and blocks packets. Service____ port ____
UDP 514Syslog
41
Standard IP Access Lists What is the
Standard IP Access Lists
42
Standard IP Access Lists
Standard IP Access Lists
43
Extended IP Access Lists
Extended IP Access Lists
44
Extended IP Access Lists
Extended IP Access Lists
45