Part 2 Flashcards

1
Q

What are networking devices that forward, filter, and flood packets between networks?

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the feasibility of a path?

A

Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the first line of defense for the network?

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What measures the distance based on number of networks a packet transverses?

A

Hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What measures amount of bits per second capacity of each link in packet’s path?

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What measures amount of microseconds that the routers within the path take to process, queue, and transmit packets?

A

Delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What measures the amount of attached links, link failures, errors, and lost packets, within the path?

A

Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What exchange routing information from WAN to WAN?

A

Exterior Gateway Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a link state routing protocol that calculates the shortest path to all destinations by lowest cost?

A

OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What determines the path by using a combination of distance, or cost of reaching a destination, and the vector (interface that the traffic from which it will be forwarded) distance uses hop count as metric variable work by having each node share routing table information with its neighbors

A

Distance Vector Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the original distance vector routing protocol used on smaller networks 15 hops or less?

A

Routing Information Protocol (RIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an upgraded version of the original distance vector protocol that includes additional information carried in RIP messages and the addition of security measures?

A

RIP version 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the most commkn hybrid protocol?

A

EIGRP - Enhanced Intererior Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Exterior Gateway Protcol that provides interdomian routing between autonomous systems (ASs)?

A

Border Gateway Protocol (BGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an EXEC command used to display information about open Telnet or rlogin connections?

A

Show sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are three modes for Port Security?

A

Protect mode
Restrict mode
Shutdown mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is propriety protocol that can only be used with other cisco routers and switches?

A

Cisco Discovery Protocol CDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What allows ping and is vulnerable to DDOS attacks?

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What allows router to inform hosts of subnet mask information for a particular network segment?

A

ICMP Mask Reply

Most cisco routers are set by default to not send ICMP mask replies but explicitly using this setting in the config file alleviates doubt and makes auditing the router easier

No ip mask-reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are 4 default TCP and UDP services enabled (Small servers)?

A

Echo
Chargen
Discard
Daytime

No service tcp-small-services
No service udp-small-services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What ensures timely detection of connection failures by monitoring TCP sessions and helps prevent DOS attacks that are aimed at maxing out available VTP lines with fraudlent sessions?

A

Keep alives

Service tcp-keepalives -in

Enables this service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Where can I find router config help commands

A

Share drive routeracl.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What kind of ACLs are used in the fleet?

A

Extended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are a group of statrments that define the handling of network packets?

A

ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What do ACLs consist of?

A

Entering the inbound router
Being relayed through the router
Exiting the outbound router interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What provides packet filtering for routers and firewalls to protect internal networks from internet and unprotected networks?

A

ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are parsed in sequential or logical form in order from top to bottom?

A

ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What mode is an ACL created in?

A

Global Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What type of ACL is placed closest to the source of traffic?

A

Extended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What type of ACL is placed closest to the target?

A

Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What range is a Standard ACL?

A

1-99

1300-1999

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What range is an extended ACL?

A

100-199

2000-2699

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the classes of networks?

A
A - 1-126
B - 128-191
C - 192-223
D - 224-239
E - 240-255
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the inverse of a subnet mask?

A

Wild card which indicates what part of the network is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How many TNOSCs are there?

A

3
Yokosuka
Naples
Bahrain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

How many Local Network Service Centers (LNSCs)?

A

11

Asia and Europe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What services does the FLTNOC provide?

A
Email
Web Cache
Domain Name Service
File Transfer Protocol
Back Up and Restore
Noc to Noc N2N fail over
DISN Defense Information Security Network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Severity code 1 for securing virtualization means what?

A

Someone or something has immediate access to the machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Severity code 2 for securing vitualization means what?

A

There is a high potential of allowing access to an intruder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Severity code 3 for securing virtual infrastructure means what?

A

Information has been found that there is a potential leading to a comprimise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Where is NCDOC based?

A

Suffolk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the Navy’s Cyber Security Service Provider?

A

NCDOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What manages the roll up of sensory data throughout the fleet including ships, submarimes, and other shore activities?

A

NCDOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What provides CND for secure DISN connectivity?

A

NCDOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What partitions the server’s physical resources?

A

VMKernel Resource Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is refered to as a hypervisor?

A

Virtual Machine Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the core vSphere OS?

A

VMKernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is INFOCON 1?

A

Security baseline must be re established every 15 days and off line drills conducted every 15 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is INFOCON 2?

A

Security baseline must be re established every 30 days and off line drills conducted every 15 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is INFOCON 3?

A

Security baseline must be re established every 60 days and off line drills conducted every 30 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is INFOCON 4?

A

Security baseline must be re established every 90 days and off line drills conducted every 60 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is INFOCON 5?

A

Normal operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What does RADIUS protocol stand for?

A
Remote
Access
Dial 
In
User
Service 

protocols sent to AAA server for log generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What are Audit trials used for?

A

Evidence and non repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What checks the source address of routed IP packets and compares it against the statement defining the ACL?

A

Standard ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What gives permit or deny access for entire protocol suite (e.g. IP) based on network(s), subnet, or host addresses?

A

Standard ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is aethod used to reduce the number of entries in an ACL and can create ACL and apply to all 16 IP subnets but must be in sequential order?

A

ACL summarizarion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is used to handle synchronization of time and ensures captured logs are accurate?

A

Network Time Protocol - NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are three types of logs on Cisco routers?

A

AAA
SNMP
System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What are the severuty codes for Cisco Logs?

A
0- emergency
1-alerts
2-critical
3-errors 
4-warnings
5-notifications 
6-informational 
7-debugging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What are the 5 different ways you can view logs?

A
Console logging
Terminal line logging
Buffered logging
Syslog logging 
SNMP Trap Logging
62
Q

Cisco routers timestamp must be explicitly turned on

A

service timestamp log date msec local show time-zone

/etc/syslog.conf
1 set
Set host

63
Q

What is a routers first line of defense?

A

Physical security
Remote access should be limited to authenticated logins or disabled. If you have disabled remote logins, the connection should be refused.

64
Q

What are the two types of Firewall policies?

A

Hardware

Software

65
Q

What is the most common and effective way to implemement a security domain (protected domain)?

A

Place a firewall at the boundary

66
Q

What type of firewalls are layer 2 and function at the Network Access layers and monitor Network layer traffic also called “bridging” because it acts as a filtering bridge between data link and network layers?

A

Transparent firewalls

67
Q

What type of firewalls operate on the Application layer of the TCP/IP model session layer on the osi model where traffic flows from the internal host to the circuit level firewall before it is permitted or denied?

A

Circuit Layer Firewall

68
Q

What type of firewall is based on packet header at the Network and Transport layer?

A

Stateless firewall

69
Q

What type of firewall keeps track of individual connections by maintaining a state table for each connection?

A

Stateful firewall

70
Q

What allows all traffic to pass through except if its explicitly blocked?

A

Permissive

71
Q

What restricts all traffic unless its explicitly allowed?

A

Restrictive

72
Q

What is a networks first line of defense to protect against external threats for an organizations network, that filters and forwards traffic?

A

Firewalls

73
Q

What filters information based on network, transport, and application layers and can monitor and filter application data based on a list of accessed websites and can provide detailed logging including “when”, “what”, and “who” data

A

Application Layer Gateway (Proxy Servers)

74
Q

What is the Juniper OS called?

A

Junos

Powers most Juniper Network routing and switching appliances similar to unix and linux

75
Q

What are permission sets referred to as?

A

User Login Classes

76
Q

What are 4 predefined classes and their permission bit sets?

A

Operator -clear, network, reset, trace, view
Read only - view
Super-user and superuser -all
Unauthorized - none

77
Q

What mode allows the administrator to view and edit configuation changes?

A

Configuration mode

78
Q

Root>edit system
Root@# set host-name vella
Root@#commit
Vella@#

A

Changing router name juniper

79
Q

What is an older network protocol that ensures loop free topology for any bridged ethernet local area network

A

Spanning tree protocol
Rstp
Vstp

80
Q

How often does NCDOC release IP block lists and dns black hole lists

A

Quarterly

81
Q

What commands do you use to troubleshoot router connectivity problems network layer

A

Nslook up

Dig

82
Q

Where are the routers startup config file stored?

A

Onboard nvram

83
Q

What are 3 critera for each request?

A
  1. Source and destination burb
  2. Source and destination network object
  3. Type of connection agent
84
Q

What is a juniper firewall product that provides deep inspection of traffic at network and application layers

A

Netscreen

85
Q

What system offers self defense fot computer networks by implementing security to allow, deny, and filter network traffic?

A

Macafee Firewall Enterprise

86
Q

What are two types of policies

A

Intra zone traffic traverse

Inter zone traffic ttaverse between different zones

87
Q

What is a highly scalable ranging the low range model through content filtering

A

Pix 500 series firewall

88
Q

Once macAfee is installed it is a component of HIPS
Host based security scan
Hbss

A

Yes.

89
Q

Ship networks have ISA server zone to act as proxy server functions as a immediary between interior and exterior networks

A

Proxy Servers

90
Q

Firewalls rules:
Allow by default
Deny by default

A

Permits all services unless explicitly denied

Denies all services unless permitted

91
Q

When explicit internal or external ip addresses / ports or entire protocols are to be blocked a denial exception rule is created and not relying on deny by default rule

A

Yes

92
Q

What contains specific information including IPs, DOAs, protocols?

A

ISA firewall policies

*System created rules cannot be disabled *

93
Q

What are initially implemented during installation and configuration of the isa server?

A

ISA firewall rules

*Any changes must be put forth by a FAM or SPAWAR *

94
Q

What exist at outer boundaries of the network and are therefore vulnerable to attack?

A

Firewalls

95
Q

What blocks, deflects, and mitigates attacks before they make it to the LAN?

A

Firewalls

96
Q

What do we call people who use readily available tools from the internet?

A

Script kiddies

97
Q

What are 3 ways to find unnecessary running programs or services?

A

Netstat -a
TCP utility program that is used to display network port connection status

Nessus - approved navy scanning tool which can perform an external port scan to identify active or listening ports

Isof-ia
A public domian program which lists all open files and their resource usage

98
Q

System admins conduct pen testing to ensure there are no holes in the firewall by

A

Ensuring rules and rule sets adhere to Navy security policy and they are in proper sequence

Conduct a port scan to verify that all unnnecessary ports and services are disabled

99
Q

What provides evidence, problem diagnosis, security information, intrustion detection, audits and response to critical events and troubleshooting?

A

Logging

100
Q
What contains basic information such as:
Service/ application
Port 
Protocol - the protocol used for the communication
Destination and source IP
A

Log files

101
Q

What operates based on a set of configuarable rules most general rules most specific at top “allow”
Top down

A

HIPS

102
Q

What are 3 types of iSA server logs?

A

Packet filtering log- dropped packets
Firewall log- traffic handled, ip, ports, protocols
Web Proxy Log- primary log used, web usage pull trend

103
Q

What provides administrators a log of configuration changes made to the isa server?

When reviewing alerts you must perform log anaysis to determine if an actual event has occured

A

ISA Server Change Tracking

104
Q

What is useful for determining what is communicating over the internet and how it is being accessed?

A

Application Usage Log

105
Q

What provides an overall picture of traffic flowing through the ISA server?

A

Traffic and utilization reports

106
Q

What draws from all service logs, packet filter, web proxy, and firewall service?

A

Security Reports

107
Q

What could indicate unauthorized traffic is being passed and host might be infected?

A

If a user shows up high on dropped packets often

108
Q

AAA framework provides access to assets in a controlled manner by 3 ways:

A

Authentication
Authroization
Accounting

109
Q

What is typically a human but can be an application or service?

A

User

110
Q

How does AAA assign accountability

A

GUID SSID assigned user serialized security identifier to track an account

111
Q

What are framework services that provide for distribution control tracking and destruction of pki?

A

NCVI

112
Q

Navy

A

NCVI, Cisco ACS, Microsoft IAS

113
Q

What is a public key or digital signature electronic document that contains a users identity, a public key, a validity period and issuing security authority in the Navys case a DOD Certificate Authority

A

What is a credential / certificate

114
Q

What is the process of determining whether an already identified and authenicated user is allowed to access information resources in a specific way

A

CA

Raduis

115
Q

Microsoft IAS server

A

Provides the RADIUS solution required to authenicate users on both the cisco routers and alcatel switch infrastructure

IAS will leverage the COMPOSE Domain Active Directory database for user validation

Impersonation- run as administrator

116
Q

What is when a user is who they claim to be?

A

Authentication

117
Q

What is evidence given by a user attempting to verify an identity?

A

Credential

118
Q

What is the process of providing an entity’s user identification to the security system?

A

Identification

119
Q

What is a CA

A

Party in authentication process that stores the user credentials and provides the mechansizm

120
Q

In defualt state also sends conplete username and password in clear txt

A

Pop3

121
Q

3 types of proof

A

Knowledge
Possession
Inheritance

122
Q

Whats also called a security database?

A

Security Authority

123
Q

What is an electronic document that uses a digital signature to bind a public key with an identity?

A

Certificate

124
Q

What is an organization or system that creates, distributes, stores, and validates digitally created signatures and identity information about machines, individuals, and services?

A

CA

125
Q

Downfalls of 3 factor identification?

A

Cost, reducing accountability

126
Q

What is the process by which both requestor and target entity must fully identify themselves before communication or access is allowed?

A

Mutual Authentication

Online banking

127
Q

3 types of role based security modern access control

A

MAC
RBAC
DAC

128
Q

What is a group that a user is assigned

A

Role

129
Q

If what fills up, and the system is unable to record the monitoring info for unauthorized activities it should not continue operating but should default to safe/secure posture pending proper retrieval / storage / archive of audit data

A

Audit log

130
Q

What should be reviewed weekly at a minimum per secnav m 52101.1 chapter 2

A

Audit trail logs or summary reports

131
Q

Why do we need two Intel Security Firewall Enterprise units

A

Load balancing

High availability

132
Q

How can you access FECC

A

Only from authorized SOC workstations

133
Q

System Audit logging must be enabled where?

A

In the devices global configuration and in each virtual domain

134
Q

What is an enterprise class management tool for creating and applying security policies across multiple firewalls?

A

Intel Security FECC

135
Q

A VPN protocol that allows for both authentication and encryption of IP packets

A

IP Sec Policy

136
Q

What can create host to host and site to site VPNs, allowing for secure communications over an encrypted medium?

A

IP Sec Policy

137
Q

What is a robust encryption that uses policy to determine “interesting” traffic

A

IP Sec Policy

138
Q

What traffic does not traverse IPSEC Tunnels

A

Broadcast

139
Q

What is hosted on a seperate physical DELL server running RHEL 6

A

LRS

Log retention server

140
Q

What cannot easily provide Quality of Service for video and voice communications or multi gigabit speeds due to processing requirements?

A

VPNs

141
Q

What is a solution for secure network connectivity between NCDOC, ONE NET, and IT21 using Internet Protocol Secure Virtual Private Network?

A

Global Out of Bound OMG

142
Q

What is used to copy logs and changes to log files from the LogLogic applicance to the LRS?

A

RSYNC
RSYNC is an open protocol widely supported across many platforms. The protocol only copies changes which greatly minimizes the amount of data travelling over the network.

143
Q

What wireless IEEE authentication framework was originally for wired networks and provides port based network access?

A

802.11x series

144
Q

What functions in 2 layers
Base layer TKIP
Countermode CBC MAC (CCMP) and allows data privacy integrity and authentication?

A

WPA2
802.11i
Surpasses previously mentioned wpa standards and utilizes Authentication Encryption Standard (AES)

145
Q

What is an encryption and authentication standard utilizing dynamic encryption by key generation?

A

WPA

146
Q

What does not provide an authentication method or mechanism?

A

WEP

147
Q

What has these two benifits:
Only the trusted systems can resolve all internal system names
External users can resolve only information that external sites require for specific reasons

A

Split DNS

148
Q

What allows the service to run as a dedicated user instead of the root or super user account?

A

Chuser

149
Q

What associates to access points by SSID not by IP or MAC Address of the access point?

A

Wireless Devices

150
Q

What have multiple advantages such as ease of installation, configuration, flexibility, scalability and mobility?

A

WLANs

151
Q

What type of attack uses a MAC of an unauthorized device is changed to the MAC of a legitimate wireless device allowing it to bypass MAC filtering?

A

Impersonation Attack