Chapter 5 Flashcards

(77 cards)

1
Q

What AAA function verifies identity?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What AAA function determines user permissions?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What AAA function monitors resources being used and logs session statistics?

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does an AAA server typically do when it receives an authentication request?

A

Challenges the user’s credentials by asking for username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the AAA server do after a user’s credentials are authenticated?

A

Authorizes them and decides which user profile to apply to the specific user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the last process in the AAA framework

A

Accounts for everything the user is doing within the network and monitors resource usage and session statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two protocols used in IPsec?

A

ESP (encapsulating security payload)
AH (authentication header)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol transports data in a site-to-site VPN?

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is encrypted multicast traffic carried between remote sites?

A

GRE (multicast) over IPsec (encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What category of traffic is sent with IPsec?

A

Unicast traffic between two endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What IPsec mode and protocol encrypt and encapsulate the entire packet?

A

Tunnel (encrypts) ESP (encapsulates)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Internet Key Exchange (IKE) do?

A

Handles negotiation of protocols and algorithms. Generates the encryption and authentication keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whats the difference between ESP tunnel and transport mode?

A

Tunnel protects the routing info by encrypting the IP header while transport mode only encrypts the payload and ESP trailer. Tunnel mode is used in site-to-site VPNs and transport mode is used in client-to-site VPNs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which security program describes badge authentication for building access?

A

Physical access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which security program describes purposely sending emails to their staff that simulates an attack?

A

User awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What formats are available to select when configuring a WLAN with a WPA2 PSK in the GUI?

A

ASCII, hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of encryption is used for WPA2-PSK?

A

AES-128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an enhancement that was implemented with WPA3?

A

Forward secrecy
SAE for authentication (protection against brute force attacks)
192-bit key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What encryption does WPA1 use?

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which WPA mode uses PSK for authentication?

A

Personal or WPA-PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which wireless security protocols use block chain cipher types?

A

WPA2, WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does WPA3 replace PSK with?

A

SAE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How many ASCII text characters can can a WPA pre-shared key contain?

A

8-63

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How many hexadecimal characters can can a WPA pre-shared key contain?

A

64 minimum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a CRL?
Certificate Revocation List Informs devices when a certificate is revoked/withdrawn
26
What is a CA?
Certificate Authority A trusted entity that grants digital certificates to individuals/organizations to establish secure connections
27
What is 802.11x?
An authentication protocol to allow network access with a RADIUS server
28
What is a mitigation technique for ARP spoofing?
Dynamic ARP inspection
29
What is a mitigation technique for 802.1q double tagging?
Configuring a VLAN access control list (VACL)
30
What is a mitigation technique for unwanted BPDUs on PortFast ports?
BPDU guard
31
What is a mitigation technique for MAC flooding attacks?
Port security Authentication with AAA server 802.1x
32
What does DHCP snooping do?
Determines whether or not traffic sources are trusted or untrusted Filters messages and rate-limits traffic from untrusted sources
33
What threats can DHCP snooping mitigate?
Rogue DHCP server Rogue clients on the network Man-in-the-middle attacks
34
What can be done in response to ARP poisoning?
Dynamic ARP inspection (DAI)
35
What is a zero-day exploit?
When a new network vulnerability is found before a fix is available
36
How can you control which devices can talk to a CPU?
CPU ACL
37
What is access-class used for?
To tie an ACL to vty lines
38
What is access-group used for?
To tie an ACL to an interface
39
Where do you want to configure extended access lists?
As close to the source as possible
40
What does implicit deny refer to?
If any ACL is configured, its the invisible "deny all" at the end
41
What is the standard ACL range and extended range?
1-99 1300-1999
42
Where do you want to configure standard access lists?
Closest to the destination
43
How do you configure a standard access list?
#access-list n [permit/deny] [source address] [wildcard]
44
How do you configure an ACL to block or forward data?
#ip access-group [acl#] [in/out]
45
How can you verify if an access-group is configured?
#show ip interface
46
How do you configure an extended access list?
#access-list n [permit/deny] [protocol] [source/wild] [destination/wild] [port number]
47
What is the extended ACL range and extended range?
100-199 2000-2699
48
What additional things can you configure extended ACLs for over standard ACLs?
Destination IP Port numbers
49
What command is used to edit existing ACLs?
#ip access-list [extended] n
50
What command can you use to verify ACL configuration?
show ip access-lists show access-lists
51
For DHCP snooping, what interface should be configured as trusted on a switch?
The one connected to the DHCP server
52
What can be done to mitigate VLAN hopping?
Put access ports in use into a VLAN that isn't the native VLAN Manually configure trunks and disable DTP
53
How can you configure port security to dynamically learned MAC addresses?
#switchport port-security mac-address sticky
54
How should port security be configured if you want logs generated?
#switchport port-security violation restrict
55
What does protect do in port security configuration?
Drops packets from unknown sources but does not increase the counter
56
Which two modes of port security drop packets when receiving packets from an unknown source?
Restrict Protect
57
What is the difference between the shutdown and restrict commands in port security?
Both send traps, but restrict drops the packet and shutdown puts the interface in an err-disabled state upon receiving a packet from an unknown source
58
What is the default behavior of port-security?
Only one MAC address can be learned and the default violation action is shutdown
59
What encryption is applied with enable secret by default?
MD5 hash
60
How do you configure a Telnet password?
line vty 0 15 password [password] [login]
61
How do you configure a password for console login?
line console 0 password [password] login
62
What happens if enable password and enable secret are configured?
The password is ignored
63
What configuration can you apply to encrypt a password?
#service password-encryption
64
How would you configure a SHA-256 password?
#enable algorithm-type sha256 secret [password]
65
What kind of attacks can be mitigated with user awareness or training?
Brute-force attacks Pharming Social engineering
66
What kind of attacks can be mitigated with physical access control?
Burglary Tailgating
67
What does DAI filter?
ARP messages received on untrusted ports
68
What kind of encryption does WEP use?
RC4
69
What is CCMP?
Cipher Block Chaining Message Authentication Code Protocol Part of the 802.11i standard, uses the AES cipher to encrypt data
70
Which wireless security protocol has an optional 192-bit encryption?
WPA3 Enterprise
71
What is the configuration needed for DAI?
DHCP snooping enabled ip arp inspection vlan n ip arp inspection trust
72
What is the configuration needed for DHCP snooping
ip dhcp snooping ip dhcp snooping vlan n (config-if)ip dhcp snooping trust/untrust
73
What types of WLC deployments are there?
Unified/Centralized Cloud-Based Embedded Mobility Express
74
What is backdoor malware?
A type of Trojan that allows attackers to gain remote access to a system by negating normal authentication procedures
75
What is a feature of RSA?
Asymmetric encryption algorithm Public-key cryptosystem
76
What privilege level grants the user access to privilege-exec mode?
15
77
What privilege level grants the user access to user-exec mode?
1