Chapter 11: It's a network Flashcards

1
Q

What are 4 types of security threats?

11.2.1.2

A

Hardware threats
Environmental threats
Electrical threats
Maintenance threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Hardware Threat?

11.2.1.2

A

physical damage to servers, routers, switches, cabling plant, and workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Environmental Threat?

11.2.1.2

A

Temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Electrical threats Threat?

11.2.1.2

A

Voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Maintenance Threat?

11.2.1.2

A

Poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Network Security Factors?

11.2.1.3

A

vulnerability
threat
attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 3 types of attacks?

11.2.2.1

A

viruses
Trojan horses
worms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 3 stages of anatomy of a worm attack

11.2.2.1

A

The enabling vulnerability
Propagation mechanism
Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 3 types of malicious code attacks

11.2.2.2

A

Reconnaissance attacks
Access attacks
Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Reconnaissance attacks

11.2.2.2

A

The unauthorized discovery and mapping of systems, services, or vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Access attacks

11.2.2.2

A

The unauthorized manipulation of data, system access, or user privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Denial of service

11.2.2.2

A

The disabling or corruption of networks, systems, or services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 4 steps to mitigate a worm attack (must be in correct order)
11.2.3.1

A

Containment
Inoculation
Quarantine
Treatment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Containment in a worm attack

11.2.3.1

A

Contain the spread of the worm within the network. Compartmentalize uninfected parts of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Inoculation in a worm attack

11.2.3.1

A

Start patching all systems and, if possible, scanning for vulnerable systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Quarantine in a worm attack

11.2.3.1

A

Track down each infected machine inside the network. Disconnect, remove, or block infected machines from the network.

17
Q

What is Treatment in a worm attack

11.2.3.1

A

Clean and patch each infected system. Some worms may require complete core system reinstallations to clean the system.

18
Q

What is the most effective way to mitigate a worm attack?

11.2.3.1

A

download security updates from the operating system vendor

19
Q

What is AAA stand for?

11.2.3.2

A

Authentication, Authorization, and Accounting

20
Q

What are the 2 most popular option for external authentication?
11.2.3.2

A

RADIUS and TACACS+

21
Q

What does RADIUS do?

11.2.3.2

A

Is an open standard with low use of CPU resources and memory. It is used by a range of network devices, such as switches, routers, and wireless devices.

22
Q

What does TACACS+ do?

11.2.3.2

A

Is a security mechanism that enables modular authentication, authorization, and accounting services. It uses a TACACS+ daemon running on a security server.

23
Q

What are 4 firewall techniques?

11.2.3.3

A

Packet Filtering
Application filtering
URL filtering
Stateful packet inspection (SPI)

24
Q

What are 4 types of firewalls?

11.2.3.3

A

Appliance-based firewalls
Server-based firewalls
Integrated firewalls
Personal firewalls

25
Q

What is a Appliance-based firewall?

11.2.3.3.

A

An appliance-based firewall is a firewall that is built-in to a dedicated hardware device known as a security appliance.

26
Q

What is a Server-based firewall?

11.2.3.3

A

A server-based firewall consists of a firewall application that runs on a network operating system (NOS) such as UNIX or Windows.

27
Q

What is a Integrated firewall?

11.2.3.3

A

An integrated firewall is implemented by adding firewall functionality to an existing device, such as a router.

28
Q

What is a personal firewall?

11.2.3.3

A

Personal firewalls reside on host computers and are not designed for LAN implementations. They may be available by default from the OS or may come from an outside vendor.

29
Q

What is the recommended length for a password?

11.2.4.2

A

At least 8 characters, preferably 10 or more characters

30
Q

What is the command line on a switch or router to enable password length and lockout attempts
11.2.4.3

A

router (config)# service password-encryption
router (config)# security password min-length 8
router (config)# login block-for 120 attempts 2 within 60

31
Q

What is the command line to “time out” a terminal connection after 10min?
11.2.4.3

A

router (config)#line vty 0 4
router (config-vty)#exec-timeout 10
router (config-vty)#end

32
Q

In the ping command what does the ! (exclamation mark) indicate?
11.3.1.1

A

Indicates receipt of an ICMP echo reply message

33
Q

In the ping command what does the . (period) indicate?

11.3.1.1

A

indicates a time expired while waiting for an ICMP echo reply message

34
Q

In the ping command what does the U indicate?

11.3.1.1

A

an ICMP unreachable message was received

35
Q

What are the 5 CDP neighbors information display?

11.3.4.3

A
Device identifiers
Address list
Port identifier 
Capabilities list
Platform
36
Q

What is the command to verify router interface?

11.3.4.4

A

show ip interface brief

37
Q

What is the command to view the file system on a switch?

11.4.1.2

A

show file systems

38
Q

What does TFTP stand for?

11.4.2.2

A

Trivial File Transfer Protocol