Module 4 Flashcards

1
Q

What is the edge router?

A

The last router between the internal network and an untrusted network, such as the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three ways to implement the edge router

A

-Single router approach
-Defense-in-depth approach
-DMZ approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three primary layers of defense?

A

-Edge router
-Firewall
-Internal router that connects to eh protected LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What two routers can the DMZ be set up between?

A

An internal router connecting to the protected network and an external router connecting to the unprotected network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three areas of router security that must be maintained?

A

Physical security, operating system security, and router hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can a router be accessed for administrative purposes?

A

Locally or remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are routers a primary target for attacks?

A

Routers act like traffic police, which direct traffic into, out of, and between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens in the single router approach?

A

All security is configured on the router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When is single router approach used mostly?

A

Smaller sights such as SOHO sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens in a defense-in-depth approach?

A

Defense-in-depth is more secure than the single router approach. It uses multiple layers of security prior to traffic entering the protected LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What security tools can be used as an addition to the three primary layers of defense?

A

-IPSs
-Web security appliances (proxy servers)
-Email security appliances (spam filtering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What serves as the primary protection for all devices in the DMZ?

A

The firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can you do to secure administrative access to prevent an unauthorized person from gaining access to an infrastructure device?

A

-Restricting device accessibility
-Logging and accounting for all access
-Authenticating access
-Authorizing actions
-Presenting legal notification
-Ensuring the confidentiality of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are MD5 hashes no longer considered secure?

A

Attackers can reconstruct valid certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does enabling a detection profile allow you to do?

A

It allows you to configure a network device to react to repeated failed login attempts by refusing further connection requests (or login blocking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a quiet period?

A

When a block is configured for a period of time

17
Q

What can the login block-for command defend against?

A

DoS attacks by disabling logins after a specified number of failed login attempts