Chapter 4 - Network Foundation Protection Flashcards Preview

Cisco CCNA Security (640-554) > Chapter 4 - Network Foundation Protection > Flashcards

Flashcards in Chapter 4 - Network Foundation Protection Deck (12):
1

What is Network Foundation Protection (NFP)?

NFP is the concept of breaking network infrastructure down into smaller components and then systematically focusing on how to secure each of those components.

2

What three planes does Network Foundcation Protection cover?

  • Management Plane
  • Control Plane
  • Data Plane

3

What do CoPP and CPPr have in common?

  • They both focus on control plane protection
  • They both can identify traffic destined for a router that will likely require direct CPU resources to be used.

4

Which type of attack can be mitigated by using a routing protocol with authentication?

  • Man-in-the-middle attacks
  • Denial-of-service attacks
  • Reconnaissance attacks

5

What is CoPP (Control Plane Policing)?

Applied globally to a router, this is a filter which will rate-limit management traffic keep a router from becoming overwhelmed by an attack. Think QoS for valid management traffic, where excess traffic is ignored and not processed by the CPU

6

What is CPPr (Control Plane Protection)?

Allows for detailed classification of traffic that is going to use a router's CPU for processing. It is similar to CoPP but with far more options to get granular with identifiying what is to be ignored.

7

What is Role Based Access Control (RBAC)?

It is a way to organize users into groups (roles) so that permissions and access can be delegated easily.

8

What is Unicast Reverse Path Forwarding (uRPF)?

This is how a router can mitigate IP spoofing. Packets that enter on an interface are compared to the router's routing table to see if it is possible that it is coming in on a source interface that really is impossible for that traffic to have originated from.

9

Why would you want to put an extended access-list closest to a source address?

Place extended ACL's as close to the source of the traffic as possible to avoid consuming network bandwith, and stop traffic before route lookups are performed.

10

What happens in a CAM table overflow attack?

A switch at Layer 2 has no more room for mac addresses, so when a new one is received it is forwarded out all of its ports for that VLAN, enabling an attacker to eavesdrop.

11

What is a DHCP starvation attack?

This is when an attacker requests all the IP addresses available from a DHCP server so that none are availale for clients who really need them.

12

What is Dynamic ARP Inspection (DAI) used for?

It protects against ARP spoofing and ARP poisoning (incorrect IP to MAC address maps) which can be used for man-in-the-middle attacks.