Week 2 Flashcards

(67 cards)

1
Q

What is a logical subgroup within a LAN that is created via software?

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is combining multiple physical links between two switches into one logical link called?

A

Link aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What controls link aggregation?

A

Link aggregation control protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the biggest way to protect against unauthorized connections to a switch?

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does STP prevent?

A

-Broadcast storm
-switching loops
Within layer 2 networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three types of access for remote access?

A
  • admin access
  • end user access
  • limited (general) access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type(s) of VPN is transparent to servers?

A

Host-to-Gateway

Gateway-to-Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type(s) of VPN is transparent to users?

A

Gateway-to-Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type(s) of VPN(s) protects VPN endpoints?

A
  • host to host
  • host to gateway
  • gateway to gateway
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two forms of full virtualization?

A
  • bare metal

- hosted solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What VLAN do you NOT use?

A

VLAN 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do you use to create and run VM’s?

A

VSphere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of VMKernel?

A

Run VM’s and manages host physical resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some threats to a VM?

A
  • malicious insiders
  • hijacked service accounts
  • unknown risks of application being used with service
  • misconfigurations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you secure the OS?

A
  • follow the STIG guidance
  • install updates
  • monitor the network
  • delete unused VM’s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do you NOT use for backups?

A

Snapshots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The MAC address change policy is set to what? To prevent?

A
  • reject

- MAC spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What partitions server resources?

A

VMKernel Resource Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What do routers do?

A

They are networking devices that forward, filter, and flood packets between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When you use the AAA banner, what would you see?

A

AAA Auhentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What banner would you see after logging in for shell prompt?

A

EXEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an ACL?

A

Log, deny traffic

Handles network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How do you read an ACL?

A

From the top down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What mode do you create an ACL in?

A

Global config mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Two types of ACLs.
Standard | Extended
26
Three types of router logs
AAA logs SNMP logs System logs
27
What logs are persistent and long term?
Syslogs
28
What are log messages that are stored in buffer?
Buffer logging
29
Viewing method that pops up in the router where you can change passwords.
Console
30
If you have the physical location of a router, what can you do?
Break boot sequence | Console recovery
31
OSPF supports two kinds of authentication. What are they?
Plain text | MD5
32
Mac filtering protects against?
MAC spoofing attacks | Unauthorized switches and hubs
33
What allocates processor, memory, and storage resources for VM’s?
VMKernel Resource Manager
34
Do you want CDP enabled or no? Why?
No. | When enabled, it can give out IOS version and allow network mapping
35
What is the last rule on a firewall or ACL?
Deny
36
How do you read an ACL and firewall?
From top to bottom
37
Network packets that a ACL controls consist of:
- entering the inbound router interfaces - being relayed through the router - exiting the outbound router interface
38
What kind of log for authentication events?
AAA log
39
What kind of log shows changes sent to SNMP server?
SNMP logs
40
There are Different types of firewalls. What type cares about individual connections and keeping track of state?
Stateful packets
41
What monitors network layer traffic and acts as a bridge. It is also transparent.
Network access layer
42
What type of proxy server is invisible to the client computer?
Transparent proxy
43
What kind of proxy is sent directly to the proxy server instead of the internet?
Forward proxy
44
Filters based on network, transport and application later
Application layer gateway
45
What provides enhanced security by not exposing internal web servers to the internet?
Reverse proxy
46
What are some built in protections to defend attacks on ISA server?
- DHCP poisoning - intrusion protection - spoof detection
47
What are some general attacks that can occur on the firewall?
- worms - DoS/DDoS - DNS attacks
48
What tools are used to identify unnecessary programs?
- netstat -a - Nessus - Isof -ia
49
What is Netstat -a?
TCP utility program used to display network port connection status
50
What is Nessus?
ACAS utility
51
What is Isof -is?
Lists open files and resource usage
52
What is the primary log used on he ISA server that shows web usage?
Web proxy
53
What shows information about dropped packets?
Packet filter log
54
The ISA server is configured to log by default the firewall service. True or false?
True
55
What are the three A’s in AAA?
- Authentication - Authorization - Accounting
56
What is he act of determining if a certain right or access can be granted?
Authorization
57
What are the user authentication components?
- supplicant - authenticator - security authority
58
What component is when the user is requesting identification and authentication?
Supplicant
59
What component is when it provides resources to the client or authorizes to access the resources?
Authenticator
60
What component stores user credentials?
Security Authority
61
What are he three authentication methods with examples.
- knowledge: something you know - possession: something you have - inherence: something you are
62
What does INFOCON stand for?
Information operations condition
63
What is INFOCON similar to?
FPCON force protection condition
64
What level is normal for INFOCON?
5
65
Provide an example of mutual authentication
When you go to a website and the website has to verify its certificates and you have to verify yours. You authenticate each other
66
Three kinds of access control
- mandatory - discretionary - role based
67
What access control is label-based?
Mandatory access control