13 - Security Services Flashcards

1
Q

What is a Whaling attack?

A

A Phishing attack targeting high-profile individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Pharming attack?

A

An attack that involves compromising the services that direct users towards a well-known or trusted website e.g. DNS service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Watering hole attack?

A

An attacker determines which users frequently visit a site, then compromises a site and deposits malware there, only targeting those specific users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a AAA server?

A

Authentication
Authorization
Accounting

Provide a centralized and standardized location for these functions for switches and routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Cisco ISE?

A

Identity Services Engine

Platform that Cisco implements its AAA services in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is TACAS+?

A

Cisco proprietary protocol that separates each of the AAA functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What port does TACAS+ communicate over?

A

Encrypted over TCP port 49

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is RADIUS?

A

Standards based protocols that combines Authentication and Authorization into a single resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What port does RADIUS communicate over?

A

UDP ports 1812 and 1813(accounting)

Not completely encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a NAD?

A

Network Access Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What device usually is considered a NAD/NAS?

A

A Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a switch usually referred to in the AAA client role?

A

A NAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What 3 basic elements should an effective security program have?

A
  • User awareness
  • User training
  • Physical access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the issue with some older style IOS passwords?

A

They create a security exposure because the passwords existed in the configuration file as clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the command to encrypt passwords normally stored as clear text?

A

Global command:

service password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does IOS add in front of passwords in the config file to signify they are encrypted?

A

7

17
Q

True/False: The no service password-encryption command immediately decrypt stored passwords that are encrypted

A

False

18
Q

True/False: The password encryption service on IOS is not strong

A

True

19
Q

Why is the enable secret command the preferred way for storing passwords?

A

It stores them as a hash rather than weak encryption

20
Q

How can you use a different algorithm type for the enable secret command?

A

enable algorithm-type {sha256 | scrypt } secret test123

21
Q

True/False: You can configure both username test password test and username test secret test commands at the same time just like enable secret and enable password

A

False

22
Q

What sub-command do you use on a vty line to enable an ACL on it?

A

access-class 3 in

23
Q

What is the Cisco ASA?

A

Adaptive Security Appliance (Firewall)

24
Q

What are firewall security zones used for?

A

Defining which hosts can initiate new connections from one zone to another

25
Q

What type of IPS mostly applies logic based on signatures?

A

Traditional IPS

26
Q

What do next generation firewalls do differently?

A

Look at the application layer data to identify the application instead of relying on port numbers. Essentially deep packet inspection

27
Q

What is AVC?

A

Application Visibility and Control (Deep packet inspection)

28
Q

What are 3 key problems with traditional IPS systems?

A
  • IPS compares whole signature database to all messages
  • Generates too many events
  • Staff must figure out which events are useful
29
Q

How does a NGIPS improve on IPS?

A

Examines the context by gathering data from all hosts and their users in order to make more intelligent choices