Week 2 Flashcards

1
Q

What is a logical subgroup within a LAN that is created via software?

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is combining multiple physical links between two switches into one logical link called?

A

Link aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What controls link aggregation?

A

Link aggregation control protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the biggest way to protect against unauthorized connections to a switch?

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does STP prevent?

A

-Broadcast storm
-switching loops
Within layer 2 networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three types of access for remote access?

A
  • admin access
  • end user access
  • limited (general) access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type(s) of VPN is transparent to servers?

A

Host-to-Gateway

Gateway-to-Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type(s) of VPN is transparent to users?

A

Gateway-to-Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type(s) of VPN(s) protects VPN endpoints?

A
  • host to host
  • host to gateway
  • gateway to gateway
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two forms of full virtualization?

A
  • bare metal

- hosted solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What VLAN do you NOT use?

A

VLAN 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do you use to create and run VM’s?

A

VSphere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of VMKernel?

A

Run VM’s and manages host physical resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some threats to a VM?

A
  • malicious insiders
  • hijacked service accounts
  • unknown risks of application being used with service
  • misconfigurations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you secure the OS?

A
  • follow the STIG guidance
  • install updates
  • monitor the network
  • delete unused VM’s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do you NOT use for backups?

A

Snapshots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The MAC address change policy is set to what? To prevent?

A
  • reject

- MAC spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What partitions server resources?

A

VMKernel Resource Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What do routers do?

A

They are networking devices that forward, filter, and flood packets between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When you use the AAA banner, what would you see?

A

AAA Auhentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What banner would you see after logging in for shell prompt?

A

EXEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an ACL?

A

Log, deny traffic

Handles network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How do you read an ACL?

A

From the top down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What mode do you create an ACL in?

A

Global config mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Two types of ACLs.

A

Standard

Extended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Three types of router logs

A

AAA logs
SNMP logs
System logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What logs are persistent and long term?

A

Syslogs

28
Q

What are log messages that are stored in buffer?

A

Buffer logging

29
Q

Viewing method that pops up in the router where you can change passwords.

A

Console

30
Q

If you have the physical location of a router, what can you do?

A

Break boot sequence

Console recovery

31
Q

OSPF supports two kinds of authentication. What are they?

A

Plain text

MD5

32
Q

Mac filtering protects against?

A

MAC spoofing attacks

Unauthorized switches and hubs

33
Q

What allocates processor, memory, and storage resources for VM’s?

A

VMKernel Resource Manager

34
Q

Do you want CDP enabled or no? Why?

A

No.

When enabled, it can give out IOS version and allow network mapping

35
Q

What is the last rule on a firewall or ACL?

A

Deny

36
Q

How do you read an ACL and firewall?

A

From top to bottom

37
Q

Network packets that a ACL controls consist of:

A
  • entering the inbound router interfaces
  • being relayed through the router
  • exiting the outbound router interface
38
Q

What kind of log for authentication events?

A

AAA log

39
Q

What kind of log shows changes sent to SNMP server?

A

SNMP logs

40
Q

There are Different types of firewalls. What type cares about individual connections and keeping track of state?

A

Stateful packets

41
Q

What monitors network layer traffic and acts as a bridge. It is also transparent.

A

Network access layer

42
Q

What type of proxy server is invisible to the client computer?

A

Transparent proxy

43
Q

What kind of proxy is sent directly to the proxy server instead of the internet?

A

Forward proxy

44
Q

Filters based on network, transport and application later

A

Application layer gateway

45
Q

What provides enhanced security by not exposing internal web servers to the internet?

A

Reverse proxy

46
Q

What are some built in protections to defend attacks on ISA server?

A
  • DHCP poisoning
  • intrusion protection
  • spoof detection
47
Q

What are some general attacks that can occur on the firewall?

A
  • worms
  • DoS/DDoS
  • DNS attacks
48
Q

What tools are used to identify unnecessary programs?

A
  • netstat -a
  • Nessus
  • Isof -ia
49
Q

What is Netstat -a?

A

TCP utility program used to display network port connection status

50
Q

What is Nessus?

A

ACAS utility

51
Q

What is Isof -is?

A

Lists open files and resource usage

52
Q

What is the primary log used on he ISA server that shows web usage?

A

Web proxy

53
Q

What shows information about dropped packets?

A

Packet filter log

54
Q

The ISA server is configured to log by default the firewall service.
True or false?

A

True

55
Q

What are the three A’s in AAA?

A
  • Authentication
  • Authorization
  • Accounting
56
Q

What is he act of determining if a certain right or access can be granted?

A

Authorization

57
Q

What are the user authentication components?

A
  • supplicant
  • authenticator
  • security authority
58
Q

What component is when the user is requesting identification and authentication?

A

Supplicant

59
Q

What component is when it provides resources to the client or authorizes to access the resources?

A

Authenticator

60
Q

What component stores user credentials?

A

Security Authority

61
Q

What are he three authentication methods with examples.

A
  • knowledge: something you know
  • possession: something you have
  • inherence: something you are
62
Q

What does INFOCON stand for?

A

Information operations condition

63
Q

What is INFOCON similar to?

A

FPCON force protection condition

64
Q

What level is normal for INFOCON?

A

5

65
Q

Provide an example of mutual authentication

A

When you go to a website and the website has to verify its certificates and you have to verify yours. You authenticate each other

66
Q

Three kinds of access control

A
  • mandatory
  • discretionary
  • role based
67
Q

What access control is label-based?

A

Mandatory access control