13 - Security Services Flashcards

1
Q

What is a Whaling attack?

A

A Phishing attack targeting high-profile individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Pharming attack?

A

An attack that involves compromising the services that direct users towards a well-known or trusted website e.g. DNS service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Watering hole attack?

A

An attacker determines which users frequently visit a site, then compromises a site and deposits malware there, only targeting those specific users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a AAA server?

A

Authentication
Authorization
Accounting

Provide a centralized and standardized location for these functions for switches and routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Cisco ISE?

A

Identity Services Engine

Platform that Cisco implements its AAA services in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is TACAS+?

A

Cisco proprietary protocol that separates each of the AAA functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What port does TACAS+ communicate over?

A

Encrypted over TCP port 49

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is RADIUS?

A

Standards based protocols that combines Authentication and Authorization into a single resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What port does RADIUS communicate over?

A

UDP ports 1812 and 1813(accounting)

Not completely encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a NAD?

A

Network Access Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What device usually is considered a NAD/NAS?

A

A Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a switch usually referred to in the AAA client role?

A

A NAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What 3 basic elements should an effective security program have?

A
  • User awareness
  • User training
  • Physical access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the issue with some older style IOS passwords?

A

They create a security exposure because the passwords existed in the configuration file as clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the command to encrypt passwords normally stored as clear text?

A

Global command:

service password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does IOS add in front of passwords in the config file to signify they are encrypted?

17
Q

True/False: The no service password-encryption command immediately decrypt stored passwords that are encrypted

18
Q

True/False: The password encryption service on IOS is not strong

19
Q

Why is the enable secret command the preferred way for storing passwords?

A

It stores them as a hash rather than weak encryption

20
Q

How can you use a different algorithm type for the enable secret command?

A

enable algorithm-type {sha256 | scrypt } secret test123

21
Q

True/False: You can configure both username test password test and username test secret test commands at the same time just like enable secret and enable password

22
Q

What sub-command do you use on a vty line to enable an ACL on it?

A

access-class 3 in

23
Q

What is the Cisco ASA?

A

Adaptive Security Appliance (Firewall)

24
Q

What are firewall security zones used for?

A

Defining which hosts can initiate new connections from one zone to another

25
What type of IPS mostly applies logic based on signatures?
Traditional IPS
26
What do next generation firewalls do differently?
Look at the application layer data to identify the application instead of relying on port numbers. Essentially deep packet inspection
27
What is AVC?
Application Visibility and Control (Deep packet inspection)
28
What are 3 key problems with traditional IPS systems?
- IPS compares whole signature database to all messages - Generates too many events - Staff must figure out which events are useful
29
How does a NGIPS improve on IPS?
Examines the context by gathering data from all hosts and their users in order to make more intelligent choices