CH 6 & 7 Flashcards

1
Q

feature where If BPDUs show up where they should not, the switch protects itself.

A

BPDU Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Controls which ports are not allowed to become root ports to remote
root switches

A

root guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Limits the number of MAC addresses to be learned on an access
switch port

A

port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Prevents rogue DHCP servers from impacting the network.

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Prevents spoofing of Layer 2 information by hosts.

A

dynamic arp inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Prevents spoofing of Layer 3 information by hosts

A

IP Source Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

you can authenticate
users before allowing their data frames into the network

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Limits the amount of broadcast or multicast traffic flowing through
the switch

A

storm control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used for traffic control and to enforce policy

A

ACL’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a security feature that acts like a firewall between untrusted hosts and
trusted DHCP servers

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings

A

DAI (dynamic arp inspection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

breaking the infrastructure down into smaller components and then
systematically focusing on how to secure each of those components

A

Network Foundation Protection
(NFP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what 2 features can be used to protect the control plane

A

CoPP and CPPr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

uses UDP port 123, and it allows network devices to
synchronize their time

A

NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This feature maintains a secure working copy of the router IOS image and the startup configuration files at all times. Once the
feature is enabled, the administrator cannot disable it remotely (but can if connected directly
on the console)

A

Secure Bootset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPv6 link local addresses begin with what?

A

FE80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How many bits in an IPv6 Addrss

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What characters are added to the 48 bit MAC address to arrive at a 64 bit host ID in a link local IPv6 address

A

FFFE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

::1 what type of IPv6 address is this?

A

Link local (same as 127.0.0.1in IPv4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The IPv6 multicast group that all IPv6 devices join is

A

FF02::1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In addition to the multicast group address of FF02::1
that is joined by all devices configured for IPv6, routers that have had routing enabled
for IPv6 also join which multicast group?

A

FF02:2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Global
IPv6 unicast addresses have the first four characters in the range of ?

A

2000 - 3FFF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the 2 types of process switched traffic

A

receive adjacency traffic, data plane traffic requiring special processing by CPU

24
Q

List the types of data plane traffic that require special processing by the CPU

A

ACLs, URPF, IP options, Fragmentations, TTL expired, ICMP unreachable, Traffic requiring ARP request, Non-IP Traffic

25
When creating an ACL for use with a CoPP policy, what does a deny rule in the ACL do?
Packets that match a deny rule are excluded from that class and cascade to the next class (if one exists) for classification.
26
CPPr can restrict traffic with finer granularity by dividing the aggregate control plane into three separate control plane categories known as sub-interfaces, what are the 3 subinterfaces
■ Host sub-interface ■ Transit sub-interface ■ CEF-Exception sub-interface
27
List some shortcomings of legacy IPS
■ They often need to be operated in conjunction with other products or tools (firewalls, analytics, and correlation tools). ■ They are sometimes not very effective and may be ignored. ■ Their operation costs and the operating resources they need are high. ■ They can leave infrastructures imperfectly covered against attackers.
28
List some of the newer capabilities of NGIPS
application awareness and control, content awareness, contextual awareness, host and user awareness, automated tuning and recommendations, impact and vulnerability assessment of the events taking place
29
originally created by SourceFire, is an open source IPS tool that is widely used in the industry
Snort
30
a collection of one or more inline, passive, switched, or routed interfaces (or ASA interfaces) that you can use to manage and classify traffic in different policies.
security zone
31
a solution that allows you to manage your firewalls from the cloud. You can write a policy once and enforce it consistently across multiple Cisco ASA and Cisco FTD devices
Cisco Defense Orchestrator (CDO)
32
a stateful firewall used in Cisco IOS devices
Zone Based Firewall (ZBFW)
33
what type of firewalls can also be implemented in an SD-WAN solution
ZBFW
34
What type of traffic can transparent FW's inspect that routed FW's can't.
Traffic on the same LAN segment
35
Cisco ASA acts as a secured bridge that switches traffic from one interface to another.
single mode transparent firewall
36
In a multimode transparent firewall (MMTF), Cisco ASA acts in a similar fashion to how it performs in single mode, with two major exceptions:
1) An interface can't be shared between 2 context in this mode 2) you must configure an IP address to the bridge virtual interface (BVI) in each context for administration and management purposes
37
For failover configuration, which device can't do active/active...ASA or FTD
FTD
38
Which models of FTD can be configured as a cluster
9300 and 4100
39
When you deploy a cluster, the FTD devices create a cluster-control link. By default, what port-channel number is assigned
port-channel 48
40
FTD 9300's are capable of intra-chassis clustering which utilizes the backplane for cluster communications. When deploying inter-chassis clustering, what is required for cluster communication?
Physical interface in etherchannel configuration.
41
How should the cluster control link be sized?
The cluster control link should be sized to match the throughput of each cluster participant because both data and control traffic are forwarded over the cluster control link.
42
An ACL is a collection of security rules or policies that allows or denies packets after looking at the packet headers and other attributes. Each permit or deny statement in the ACL is referred to as an?
Access Control Entry (ACE)
43
List the 5 tuples of an ACL
Source port Source Address Destination port Destination Address Protocol
44
The Cisco ASA supports four different types of ACLs to provide a flexible and scalable solution to filter unauthorized packets into the network, what are they?
Standard Extended Ether-type Web-type
45
Standard ACLs are used to identify packets based on their destination IP addresses. These ACLs can be used in which scenarios?
split-tunnel ACL route-redistribution in route-maps
46
An EtherType ACL can be configured only if?
ASA is in transparent mode
47
A Webtype ACL allows Cisco ASA administrators to restrict traffic coming through?
SSL VPN Tunnels
48
what can be added to the end of an access-group command to specify an ACL as a management access rule
control-plane
49
True or False. Management-specific protocols provide their own control-plane protection and have higher precedence than a to-the-box traffic-filtering ACL
True
50
If you deploy interface ACLs to block all ICMP traffic, the security appliance, by default, does not restrict the ICMP traffic that is destined to its own interface. How can you filter ICMP traffic to the ASA's interfaces?
ICMP policy or control plan ACLs
51
Cisco ASA supports which 4 methods for translating an address?
■ Static NAT/PAT ■ Dynamic NAT/PAT ■ Policy NAT/PAT ■ Identity NAT
52
examines decoded packets for attacks based on patterns and can block or alter malicious traffic
intrusion policy
53
attempt to make the streams of packets as much as possible like the reassembled packets that will be seen by the endpoints receiving them
preprocessor
54
list a few examples of preprocessors that FTD has
DNS, HTTP, SIP, FTP & Telnet, SSH, SMTP, POP & IMAP, Network preprocessors, Threat preprocessors
55
provides next-generation security services that go beyond pointin-time detection. It provides continuous analysis and tracking of files and also retrospective security alerts so that a security administrator can take action during and after an attack
Cisco AMP for Networks