Module 4: Secure Device Access Flashcards

1
Q

What is the edge router?

A

The last router between the network and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Edge Router security approaches?

A

a single router, DiD, or a DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is defence in depth?

A

This uses multiple layers of security prior to traffic entering the protected LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a DMZ?

A

It enables organizations to provide access to untrusted networks, such as the internet, while keeping private networks secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three areas of router security?

A

Physical, operating system and router hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you physically secure a router?

A

Place the router and physical devices that connect to it in a secure locked room that is accessible only to authorized personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you secure the OS on a router?

A

configure it with as much memory as possible, and use the latest OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how do you harden a router?

A

Ensure that only authorized personnel have access and that their level of access is controlled. Disable unused ports and interfaces and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the command to command to encrypt all plain text passwords?

A

service password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you verify passwords are encrypted command?

A

show running-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you set password minimum length?

A

security passwords min-length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the command to stop brute forcing of a router password?

A

login block-for 120 attempts 3 within 60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a type 5 password?

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a type 8 password?

A

scrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a type 9 password?

A

SHA256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does a banner do?

A

It protects the organisation from a legal perspective

17
Q

What is SSH

A

Secure Shell

18
Q

What is step 1 to configure SSH?

A

configure a unique device hostname

19
Q

What is step 2 to configure SSH?

A

configure the IP Domain name

20
Q

What is step 3 to configure SSH?

A

Generate a key to encrypt SSH traffic

21
Q

What is step 4 to configure SSH?

A

Verify or create a local database entry

22
Q

What is step 5 to configure SSH?

A

Authenticate against the local database

23
Q

What is step 6 to configure SSH?

A

Enable vty inbound SSH sessions

24
Q

How do you verify the status of SSH?

A

show ssh

25
Q

What are 2 examples of a SSH client?

A

PuTTY or OpenSSH