12 - Network Security Basics Flashcards

1
Q

What are the three general goals of adversaries?

A

access to information
modification of information
denial of access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an adversary?

A

An entity that poses a threat to the operation of a network device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a passive attack?

A

do not modify data and typically involve the monitoring of data flows between systems
ie packet sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an active attack?

A

typically modify or disrupt the flow of data

ie denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a close-in attack?

A

those that rely on the close physical proximity of the attacker to the target system
ie an attacker watching a user type in a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an insider attack?

A

involves a user that normally has some form of access to the target system
ie employee transferring confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a distribution attack?

A

occurs when a malicious user modifies hardware or software prior to installation
ie a software backdoor created by the vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four types of physical threats to a network?

A

electrical
hardware
environmental
administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two most threatening types of environmental threats?

A

temperature

humidity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some tools used in a reconnaissance attack?

A

ping sweeps
packet sniffing
port scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is promiscuous mode?

A

it will no longer ignore data that is no specifically addressed to the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an access attack?

A

used to gain unauthorized access to network systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some tools used to protect assets in a network?

A

antivirus software
antispyware software
ids and ips
firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What banner is always displayed prior to login?

A

the login banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What banner is displayed prior to login for telnet but not ssh?

A

the MOTD or message of the day banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What banner is displayed prior to the login banner?

A

MOTD banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What banner is displayed once the user successfully authenticates?

A

exec banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the three types of warning banners?

A

login banner
exec banner
motd banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the command for banner logins?

A

banner motd
banner login
banner exec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the command for reverse telnet sessions?

A

banner incoming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What command is needed for the password command to work on vty, aux, or console sessions?

A

login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What command is needed to encrypt passwords on a cisco device?

A

service password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What command is needed for the password command to work on vty, aux, or console sessions?

A

login local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the three phases of AAA?

A

Authentication-verifying a users identity
authorization-verifying the level of access for a user
accounting-process of recording the use of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What AAA standard is cisco proprietary?
Tacacs+
26
What organization standardizes Radius?
IETF or internet engineering task force
27
What AAA standard combines authentication and authorization?
Radius
28
What AAA standard encrypts the entire contents of the packet?
tacacs+
29
What AAA standard only encrypts the password in a packet?
Radius
30
What port/ports is used in Radius AAA?
udp 1812 for authentication | udp 1813 for accounting
31
What port/ports is used in Tacacs+ AAA?
tcp 49 for all three
32
How do you configure AAA?
aaa new-model | username backup secret B0s0n
33
What happens automatically when the aaa new-model command is issued?
local authentication is automatically applied to all interfaces and vty lines but not the console line
34
What does enable password 0 mean?
the 0 indicates the password is unencrypted
35
What does enable password 7 mean?
the 7 indicates the password is encrypted with ciscos original password algorithm
36
What does enable secret 5 mean?
the 5 indicates the password is and md5 hash
37
What is a logging severity of 0?
emergencies
38
What is a logging severity of 1?
alerts
39
What is a logging severity of 2?
critical
40
What is a logging severity of 3?
errors
41
What is a logging severity of 4?
warnings
42
What is a logging severity of 5?
notifications
43
What is a logging severity of 6?
informational
44
What is a logging severity of 7?
debugging
45
What is the default logging severity for console, monitor, and buffer?
all severities or debugging
46
What command is used to send log messages to the vty lines?
logging monitor
47
Where does logging buffered send log messages?
to the local device in memory, cleared out on reboots
48
What command can you use to verify logging?
sh logging
49
What command/commands are used to configure logging to a server?
logging host 10.10.10.10 | logging trap 5
50
What are best practices for unused switchports?
to shut them off
51
How do you disable dynamic trunking protocol?
manually configuring an access or trunk port | switchport nonegotiate
52
What does the switchport port-security mac-address sticky command do?
the switch will automatically create static mac address entries for that port, they will be lost on a reboot unless the writ mem command is issued
53
What is the default port-security violation?
shutdown
54
What does the port-security violation of protect do?
the switch will discard the traffic
55
What does the port-security violation of restrict do?
discard the traffic, log the attempt, increment the security violation counter, and send and snmp trap message
56
What does the port-security violation of shutdown do?
discard the traffic, log the attempt, increment the security violation counter, and place the port in err-disabled
57
What command is used to verify port security on an interface?
sh port-security int fa0/1
58
What command is used to verify that an NTP client is successfully authenticated?
sh ntp assoiations detail
59
What is the default severity level for monitoring to a syslog server?
informational or 6
60
What is the default date/time stamp for log messages?
uptime since routers last reboot