Cram Deck Flashcards

1
Q

A Type __ password is a cleartext password

A

Type 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Type 7 password is one that uses the algorithm from what cipher?

A

the Vigenere cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Enhanced Password Security feature can be used to configure ____ hashing of passwords for the username command

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISE aims to deliver what?

A

ISE aims to deliver consistent access control across multivendor networks (wired & wireless) and remote connections. It also aims to provide superior visibility into who is accessing your valuable network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What TCP areas other than TTL are often targeted by hackers?

A

Window Size, Don’t Fragment (DF) bit, Type of Service (TOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Managed devices serve what purpose?

A

Managed devices are those devices that are installed on different network segments for monitoring traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Memory Threshold Notification can mitigate what conditions?

A

low-memory conditions on a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are managed devices deployed?

A

Managed devices can be deployed passively to gather detailed information about the various network issues. They can also be deployed inline in order to affect the flow of traffic via access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

After a network address is subnetted the last subnet obtained is being referred to as:

A

all-ones subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What tool can you use to manage virtual managed devices?

A

Virtual managed devices do not have web interfaces - you need to use the CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You may use _________ to identify the type and rate of traffic that reaches the control plane of the router.

A

Control Plane Policing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To enable dynamic NAT on an interface, what must you define first (and what command would need to be used)?

A

standard IP access-list, using the access-list command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the context of FireSIGHT System, Network-based objects can represent:

A

IP addresses and networks, port/protocol pairs, VLAN tags, security zones, and geolocation …etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What tool can you use to manage ASA FirePOWER devices?

A

The ASA FirePOWER devices rely on their own management applications such as the ASDM and the CSM for configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You may prevent the router from sending ICMP redirects via what command?

A

no IP redirects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Control Plane Policing may be performed through the use of what?

A

Control Plane Policing may be performed through the use of granular classification ACLs, logging, as well as the use of the show policy-map control-plane command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is GTSM and what does it do?

A

Generalized TTL-based Security Mechanism is a TTL-based security protection method that uses the TTL value of IP packets for ensuring that the BGP packets received are from a directly connected peer which is real and legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Peer authentication via MD5 is desirable or not, and why?

A

Peer authentication via MD5 is desirable as it creates an MD5 digest of each packet that is sent as part of a BGP session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What command can you use to determine if IPS is currently configured?

A

show subsys name ips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Device stacking can be used to increase what?

A

Device stacking can be used to increase what?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What command can you use to look into the contents of the ARP cache and sort out all IP entries?

A

show ip arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

To allow hosts with no knowledge of routing to determine the MAC addresses of hosts on other networks, you need to use:

A

ip proxy-arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You may use __________ to create an IPS rule.

A

You may use __________ to create an IPS rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You may create a mobility area with a router via what command?

A

ip mobile arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is TVR and what is it for?
Target Value Rating TVR is what is used for developing security policies that can be stricter for some resources than others.
26
What refers to feedback that can be used for controlling the level in which a user chooses to take actions for minimizing false positives?
Event Risk Rating ERR
27
The default behavior for IP directed broadcasts can be changed via what command?
ip directed-broadcast
28
You can use what command to specify a broadcast address which is different from the default one?
ip broadcast-address
29
The FireSIGHT System can accommodate named objects. What are these objects?
They are a form of reusable configuration.
30
LEAP was eventually replaced by what?
PEAP
31
LCP is responsible for:
establishing, setting-up, and terminating point-to-point links
32
With ___________ there is a dedicated VLAN created to trunk mirrored packets between two switches.
RSPAN
33
With Local SPAN, where are the destination and source ports located?
on the same local switch
34
Configuration revision number is carried by what advertisement?
VTP advertisement
35
You use __________ to enable authentication proxy for AAA.
aaa authorization auth-proxy default
36
A VLAN is identified with an ID number from 1 to _________ with the enhanced software image.
4094
37
Your switch must be in _________mode in order to implement VLAN IDs from 1006 to 4094.
VTP transparent mode
38
The IronPort ___-Series targets email security.
The IronPort C-Series
39
You may want to statically assign which ports will become the member of your VLAN via the _____________ command.
vlan-membership
40
LUN Masking is a process of what nature?
LUN Masking is an authorization process.
41
With ISE, the possible personas include:
Administration, Policy Service, and Monitoring.
42
To come up with a list of all VLAN IDs on a switch you need to use what command?
show running-config vlan
43
What will happen when you have a VLAN deleted?
When you have a VLAN deleted, the ports assigned to that VLAN will become inactive but will remain associated with the VLAN until you manually assign them to another VLAN.
44
In the context of ISE, a node refers to:
the individual instance that runs the Cisco ISE software.
45
STP is intended for providing:
path redundancy (and preventing network loops)
46
__________ can be constructed and applied to specific infrastructure related connections from hosts that need to access specific network infrastructure devices.
Infrastructure access control lists iACLs
47
What feature is for protecting the Cisco 12000 routers' gigabit route processor (GRP) from unnecessary and potentially dangerous traffics?
Receive ACLs
48
Which firewall feature allows a packet to avoid redundant ACL checks?
Firewall ACL Bypass
49
In order to define a reflexive access list, you need to create an entry in an extended named IP access list with the __________ keyword.
reflect
50
You may use _____________ to enable TCP intercept.
ip tcp intercept list
51
To enable Turbo ACL, you need to run the ___________ command in global configuration mode.
access-list compiled
52
You can use _____________ to show issues that are preventing the routers from forming adjacency.
debug ip ospf adj
53
_____________ is a definite course of action considered to be expedient, prudent or advantageous in guiding security.
policy
54
___________ is a Cisco model that defines a structure of security objectives and supporting security actions for organizing security controls.
Cisco Security Control Framework SCF
55
____________ describes a point in time measure of the security state of the concerned IT infrastructure.
Security Posture
56
____________ aims to provide best practice information on designing and implementing secure networks.
Cisco’s secure blueprint for enterprise networks SAFE
57
_____________ is for subdividing the infrastructure along different functional boundaries.
Functional Blocks
58
What feature allows you to apply access control policies across multiple object groups?
PBACL
59
VACL works at which layer (choose all that apply):
Filtering can be done either through a Layer 2 port or through a Layer 3 port after getting routed.
60
PBACL works at which layer?
layer 3 only
61
What is Security Intelligence feed?
A Security Intelligence feed is simply a dynamic collection of IP addresses downloaded at an interval you specify.
62
Lock-and-key has to be configured via what kinds of access lists?
IP dynamic extended access lists
63
Are Reflexive ACLs session filtering ACLs?
Yes.
64
For the initial configuration of an ASA FirePOWER module, you should use what tool?
the CLI
65
CAM table overflow can be mitigated via what measures?
One can flood the switch with invalid-source MAC addresses until the CAM table is full. Port security can be deployed against this attack.
66
DHCP snooping aims to protect against what attack?
DHCP snooping aims to protect against rogue DHCP Servers.
67
What command can you use to set a rate limit for DHCP snooping?
ip dhcp snooping rate
68
What measures can be used against ARP Cache Poisoning and ARP Spoofing?
Dynamic ARP Inspection DAI
69
What technique limits the ports within a VLAN that can communicate with other ports on the same VLAN?
Private VLAN
70
STP root bridge attack can be defended against via what measures?
Configuring Rootguard and BPDUGuard on the switch port.
71
With _____________, one configures a system to spoof as a switch by emulating either ISL or 802.1q signaling along with Dynamic Trunk Protocol DTP signaling.
switch spoofing