Chapter 11: It's a network Flashcards

1
Q

What are 4 types of security threats?

11.2.1.2

A

Hardware threats
Environmental threats
Electrical threats
Maintenance threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Hardware Threat?

11.2.1.2

A

physical damage to servers, routers, switches, cabling plant, and workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Environmental Threat?

11.2.1.2

A

Temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Electrical threats Threat?

11.2.1.2

A

Voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Maintenance Threat?

11.2.1.2

A

Poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Network Security Factors?

11.2.1.3

A

vulnerability
threat
attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 3 types of attacks?

11.2.2.1

A

viruses
Trojan horses
worms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 3 stages of anatomy of a worm attack

11.2.2.1

A

The enabling vulnerability
Propagation mechanism
Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 3 types of malicious code attacks

11.2.2.2

A

Reconnaissance attacks
Access attacks
Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Reconnaissance attacks

11.2.2.2

A

The unauthorized discovery and mapping of systems, services, or vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Access attacks

11.2.2.2

A

The unauthorized manipulation of data, system access, or user privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Denial of service

11.2.2.2

A

The disabling or corruption of networks, systems, or services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 4 steps to mitigate a worm attack (must be in correct order)
11.2.3.1

A

Containment
Inoculation
Quarantine
Treatment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Containment in a worm attack

11.2.3.1

A

Contain the spread of the worm within the network. Compartmentalize uninfected parts of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Inoculation in a worm attack

11.2.3.1

A

Start patching all systems and, if possible, scanning for vulnerable systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Quarantine in a worm attack

11.2.3.1

A

Track down each infected machine inside the network. Disconnect, remove, or block infected machines from the network.

17
Q

What is Treatment in a worm attack

11.2.3.1

A

Clean and patch each infected system. Some worms may require complete core system reinstallations to clean the system.

18
Q

What is the most effective way to mitigate a worm attack?

11.2.3.1

A

download security updates from the operating system vendor

19
Q

What is AAA stand for?

11.2.3.2

A

Authentication, Authorization, and Accounting

20
Q

What are the 2 most popular option for external authentication?
11.2.3.2

A

RADIUS and TACACS+

21
Q

What does RADIUS do?

11.2.3.2

A

Is an open standard with low use of CPU resources and memory. It is used by a range of network devices, such as switches, routers, and wireless devices.

22
Q

What does TACACS+ do?

11.2.3.2

A

Is a security mechanism that enables modular authentication, authorization, and accounting services. It uses a TACACS+ daemon running on a security server.

23
Q

What are 4 firewall techniques?

11.2.3.3

A

Packet Filtering
Application filtering
URL filtering
Stateful packet inspection (SPI)

24
Q

What are 4 types of firewalls?

11.2.3.3

A

Appliance-based firewalls
Server-based firewalls
Integrated firewalls
Personal firewalls

25
What is a Appliance-based firewall? | 11.2.3.3.
An appliance-based firewall is a firewall that is built-in to a dedicated hardware device known as a security appliance.
26
What is a Server-based firewall? | 11.2.3.3
A server-based firewall consists of a firewall application that runs on a network operating system (NOS) such as UNIX or Windows.
27
What is a Integrated firewall? | 11.2.3.3
An integrated firewall is implemented by adding firewall functionality to an existing device, such as a router.
28
What is a personal firewall? | 11.2.3.3
Personal firewalls reside on host computers and are not designed for LAN implementations. They may be available by default from the OS or may come from an outside vendor.
29
What is the recommended length for a password? | 11.2.4.2
At least 8 characters, preferably 10 or more characters
30
What is the command line on a switch or router to enable password length and lockout attempts 11.2.4.3
router (config)# service password-encryption router (config)# security password min-length 8 router (config)# login block-for 120 attempts 2 within 60
31
What is the command line to "time out" a terminal connection after 10min? 11.2.4.3
router (config)#line vty 0 4 router (config-vty)#exec-timeout 10 router (config-vty)#end
32
In the ping command what does the ! (exclamation mark) indicate? 11.3.1.1
Indicates receipt of an ICMP echo reply message
33
In the ping command what does the . (period) indicate? | 11.3.1.1
indicates a time expired while waiting for an ICMP echo reply message
34
In the ping command what does the U indicate? | 11.3.1.1
an ICMP unreachable message was received
35
What are the 5 CDP neighbors information display? | 11.3.4.3
``` Device identifiers Address list Port identifier Capabilities list Platform ```
36
What is the command to verify router interface? | 11.3.4.4
show ip interface brief
37
What is the command to view the file system on a switch? | 11.4.1.2
show file systems
38
What does TFTP stand for? | 11.4.2.2
Trivial File Transfer Protocol