Module 10 Flashcards

(47 cards)

1
Q

What does AAA stand for in network security?

A

Authentication, Authorization, Accounting

AAA provides a framework for network access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Local AAA Authentication?

A

Stores usernames and passwords locally in a network device

Ideal for small networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Server-Based AAA Authentication?

A

Router accesses a central AAA server using RADIUS or TACACS+ protocols

More appropriate for networks with multiple devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of AAA Authorization?

A

Governs what users can and cannot do on the network after authentication

Uses attributes to determine user privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does AAA Accounting do?

A

Collects and reports usage data for auditing or billing

Logs data such as connection times and executed commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the IEEE 802.1X standard?

A

A port-based access control and authentication protocol

Restricts unauthorized workstations from connecting to a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What roles do devices play in 802.1X authentication?

A

Client (Supplicant), Switch (Authenticator), Authentication Server

Each has a specific function in the authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What types of attacks are categorized under Layer 2 Security Threats?

A

MAC Table Attacks, VLAN Attacks, DHCP Attacks, ARP Attacks, Address Spoofing Attacks, STP Attacks

These attacks exploit vulnerabilities at Layer 2 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a MAC Address Table Attack?

A

Involves flooding a switch with fake source MAC addresses until the table is full

This can disrupt normal network operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a VLAN Hopping Attack?

A

Enables traffic from one VLAN to be seen by another VLAN without a router

This attack can compromise network segmentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is DHCP Snooping?

A

A security feature that prevents DHCP starvation and DHCP spoofing attacks

Helps to secure DHCP operations on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Dynamic ARP Inspection (DAI)?

A

Prevents ARP spoofing and ARP poisoning attacks

It verifies ARP packets on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IP Source Guard (IPSG)?

A

Prevents MAC and IP address spoofing attacks

It ensures that only valid IP addresses are used on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: Layer 2 vulnerabilities can affect all layers above it.

A

True

Compromise at Layer 2 can render security measures at higher layers ineffective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the function of a Next-Generation Firewall (NGFW)?

A

Provides stateful packet inspection and advanced malware protection

It integrates multiple security functions into one device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: The primary use of AAA accounting is to combine it with AAA _______.

A

authentication

This provides a log of user actions and helps in auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the Cisco Email Security Appliance (ESA) do?

A

Monitors SMTP, blocks known threats, and encrypts outgoing email

It uses real-time threat intelligence to enhance email security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the Cisco Web Security Appliance (WSA) provide?

A

Mitigation technology for web-based threats and application visibility

It controls web traffic based on organizational policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Port Security?

A

Prevents MAC address flooding attacks and DHCP starvation attacks

It limits the number of MAC addresses that can be learned on a port.

20
Q

What is an example of an attack that can be mitigated by implementing BPDU Guard?

A

STP Attack

BPDU Guard protects against manipulation of the Spanning Tree Protocol.

21
Q

What is IP address spoofing?

A

IP address spoofing is when a threat actor hijacks a valid IP address of another device on the subnet or uses a random IP address.

22
Q

How can IP and MAC address spoofing be mitigated?

A

Implementing IP Source Guard (IPSG).

23
Q

What is a STP attack?

A

A STP attack involves threat actors manipulating Spanning Tree Protocol (STP) to spoof the root bridge and change the topology of a network.

24
Q

How can STP attacks be mitigated?

A

By implementing BPDU Guard on all access ports.

25
What information does CDP provide?
CDP provides the IP address of the device, IOS software version, platform, capabilities, and the native VLAN.
26
How can the exploitation of CDP be mitigated?
Limit the use of CDP on devices or ports.
27
What is a DHCP starvation attack?
An attack that aims to create a DoS for connecting clients by leasing all available IP addresses with bogus MAC addresses.
28
What is a rogue DHCP server?
A rogue DHCP server provides false IP configuration parameters to legitimate clients.
29
What types of misleading information can a rogue DHCP server provide?
It can provide: * Wrong default gateway * Wrong DNS server * Wrong IP address
30
What is ARP spoofing?
ARP spoofing is when an attacker sends a gratuitous ARP message containing a spoofed MAC address to a switch, allowing for a man-in-the-middle attack.
31
How can ARP spoofing be mitigated?
By implementing Dynamic ARP Inspection (DAI).
32
What is a MAC address table overflow attack?
An attack that floods a switch with fake source MAC addresses until the switch's MAC address table is full.
33
What happens when a switch's MAC address table is full?
The switch treats incoming frames as unknown unicast and floods all traffic out all ports on the same VLAN.
34
What is a VLAN hopping attack?
A VLAN hopping attack allows traffic from one VLAN to be seen by another VLAN without the aid of a router.
35
What is a VLAN double-tagging attack?
An attack where a hidden 802.1Q tag is embedded inside a frame with another 802.1Q tag, allowing it to reach a different VLAN.
36
How can VLAN hopping and double-tagging attacks be mitigated?
By implementing trunk security guidelines such as: * Disable trunking on all access ports * Disable auto trunking on trunk links * Ensure the native VLAN is only used for trunk links.
37
What command disables CDP globally on a device?
no cdp run
38
What command enables CDP globally on a device?
cdp run
39
What command disables CDP on a port?
no cdp enable
40
What command enables CDP on a port?
cdp enable
41
True or False: CDP information is sent in encrypted broadcasts.
False
42
What tool can be used for DHCP starvation attacks?
Gobbler
43
What does the Dynamic ARP Inspection (DAI) do?
DAI helps to prevent ARP spoofing and ARP poisoning.
44
What is a gratuitous ARP?
An unsolicited ARP Reply sent by a client.
45
Fill in the blank: The tool _______ can flood a switch with bogus frames to create a MAC address table overflow attack.
macof
46
What is the primary function of DHCP servers?
To dynamically provide IP configuration information to clients.
47
What is an example of a DHCP spoofing attack?
A rogue DHCP server providing an invalid IP address to clients.