CPE 046 Flashcards
(60 cards)
ıs a multıtaskıng operatıng
system used on most Cısco routers
and swıtches.
IOS (Internetwork Operatıng
System)
IOS
(Internetwork Operatıng
System)
ıs used to
confıgure routıng, swıtchıng,
ınternetworkıng and other features
supported by a Cısco devıce.
IOS
thıs type of access ıs usually used to confıgure newly
acquıred devıces. These devıces usually don’t have an IP address confıgured,
and therefore cannot be accessed through the network.
Console access
thıs type of access used to be a common way to access network devıces. ________ ıs a termınal emulatıon program that enables you to access IOS through the network and confıgure the devıce remotely. Uses
TCP port 23
Telnet access
– lıke Telnet, thıs access type enables you to confıgure devıces
remotely, but ıt adds an extra layer of securıty by encryptıng all
communıcatıons usıng publıc-key cryptography. SSH uses well known TCP
port 22.
SSH access
IOS Command Hierarchy
User EXEC COMMANDS
PRIVILEGED EXEC COMMANDS
Global Configuration Commands
Configuration Mode
Interface
Subinterface
Controller
Map-list
Map-class
line
router
ipx-router
route-map
is the practice of protecting systems,
networks, and programs from digital attacks.
Cybersecurity
The Pillars of Cybersecurity
Best Practices
Policies & Procedures
Products & Services
You set up a new network for a growing company, but you don’t
follow all of the recommended cybersecurity best practices. While you may have invested in robust security products, they can be easily subverted by _________________
failure to follow best practices.
or
Best practices
Examples: Acceptable use policies, employee training.
Failure Example: Deploying a content filter without training employees, leading to risky behavior.
Policies & Procedures:
Examples: Firewalls, antivirus software, maintenance subscriptions.
Failure Example: Skipping security service licenses, leaving systems vulnerable to zero-day attacks.
Products & Services:
Examples: Locking doors (analogous to securing networks), using strong passwords, updating firmware.
Failure Example: Installing robust security tools but using weak passcodes (e.g., “1234”).
Best practices
CIA TRIAD
Confidentiality
Integrity
Availability
Confidential information is kept secret to prevent: identity theft,
compromised accounts and systems, legal concerns, damage to
reputation, and other severe consequences.
Confidentiality
MFA
multifactor authentication
Data is one of the most valuable assets a company can have, but it is not static. It can be transferred to other systems, altered, and
updated multiple times.
Integrity
____________ guarantees that data is accurate, complete, and consistent.
Integrity
It covers data in storage, during processing, and in transit. Without data integrity, loss, corruption, or compromise can cause significant damage and financial loss for both businesses and customers.
Integrity
The two main types of data integrity are:
Physical data integrity
Logical data integrity
is the collection of actions and fail-safes that
protect the physical systems that store and process the data.
Physical data integrity
are the checks and protocols that protect data
from human error and hackers. These confirm that data is correct and
accurate as it’s used in different ways within an organization
Logical data integrity
means that authorized users have immediate and
reliable access to their data. This includes granting access to
authorized users with passwords and security questions.
Data availability or Availability