Term
|
Definition
Something were going to protect |
|
|
Term
|
Definition
a spot of weakness in the network |
|
|
Term
|
Definition
somthing out to get the network |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Cisco security framework that keeps security policies up to date and enforced |
|
|
Term
|
Definition
Users & roles are employed to describe / defend threats |
|
|
Term
Example of context aware security |
|
Definition
I can only access the asa when on local lan |
|
|
Term
|
Definition
Application security appliance |
|
|
Term
|
Definition
Intrusion prevention system |
|
|
Term
What exists on the management plane |
|
Definition
Hardware and traffic needed to administer the devices on the network |
|
|
Term
Example of management traffic |
|
Definition
SSH / HTTPS/ SNMP / Netflow |
|
|
Term
|
Definition
Logic systems that make route / switch decisions |
|
|
Term
Example of control plane traffic |
|
Definition
Secured routing protocols (i.e. encrypted ospf updates) |
|
|
Term
|
Definition
Our ability to forward general data |
|
|
Term
|
Definition
End user accessing FTP or sharepoint server |
|
|
Term
|
Definition
|
|
Term
|
Definition
The concept of securing the Management / Control / Data planes |
|
|
Term
|
Definition
Unicast reverse path forwarding |
|
|
Term
|
Definition
Checks entry point of packet against route table. Ensures ingress request matches egress request |
|
|
Term
|
Definition
Spoofed ip source addresses traversing the network |
|
|
Term
|
Definition
Authentication, authorization, accounting |
|
|
Term
What is a AAA method list |
|
Definition
What database each individual A will use |
|
|
Term
What's an example of a AAA method list |
|
Definition
|
|
Term
What are the default privilege levels |
|
Definition
0 & 15 are defaults, 1-14 are for customization |
|
|
Term
|
Definition
Assigning custom / restricted commands to a privilege level |
|
|
Term
|
Definition
Send data about router / switch health to syslog server |
|
|
Term
|
Definition
|
|
Term
|
Definition
Prevents erasing / tampering of ios files via secure ftp |
|
|
Term
What is inter-vlan routing |
|
Definition
Moving data between vlans |
|
|
Term
2 examples of a inter-vlan |
|
Definition
Router on a stick (RoS) / virtual RoS |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Preventing storms / packet loops |
|
|
Term
|
Definition
Ensure only 1 path is used in moving data around |
|
|
Term
How is the root port selected |
|
Definition
Lowest number between two trunk switch ports |
|
|
Term
How do root guard enabled trunks communicate |
|
Definition
|
|
Term
What is an extended ACL # |
|
Definition
|
|
Term
Define ACE (in the context of ACL's) |
|
Definition
ACE - Access control entity |
|
|
Term
|
Definition
Collection of ACL lines and code |
|
|
Term
|
Definition
|
|
Term
What is a syn-flood attack |
|
Definition
A massive amount of syn requests w/o the ack response sent from attacking server |
|
|
Term
Syn-flood attack involves what protocol? |
|
Definition
|
|
Term
What is the standard ACL #'s in ios |
|
Definition
|
|
Term
(CCP-GUI) how do I access the ACL editor? |
|
Definition
Config -> router - > acl - > acl editor |
|
|