Term
AES and 3DES are what kind of algorithms |
|
Definition
|
|
Term
Double tagging is used with what kind of attack |
|
Definition
|
|
Term
Do disabled signatures use router resources |
|
Definition
|
|
Term
What is the main goal of STP |
|
Definition
prevent loops by managing the actual physical path used in switching |
|
|
Term
(Site to Site VPN) How do R1 and R2's ACL's need to be configured |
|
Definition
Router A and B need to match but reversed (text book term is mirrored ACLs) |
|
|
Term
main problem with stateful firewalls |
|
Definition
limited application-layer attack detection |
|
|
Term
|
Definition
host based intrusion prevention services. (note: not best practice to be company wide) |
|
|
Term
MIB (Management Information Base) is defined by what |
|
Definition
a structure that defines a series of objects... Information about a managed device’s resources and activity is defined by a series of objects. The structure of these management objects is defined by a managed device’s Management Information Base (MIB) .(pg128) |
|
|
Term
Ideally IPS need to be placed at 1. Only Datacenters 2. Only Main Office 3. Only Remote offices 4. All Remote offices |
|
Definition
|
|
Term
Port 8080 is used for what |
|
Definition
This port is a popular alternative to port 80 for offering web services. "8080" was chosen since it is "two 80's", and also because it is above the restricted well known service port range (ports 1-1023) (Source: GRC) |
|
|
Term
(CCP) Where are AAA Authentication policies created |
|
Definition
Authentication Policies - Login |
|
|
Term
(FW) By default is inbound traffic started by the outside allowed in on a sec lev 50 DMZ? |
|
Definition
|
|
Term
(FW) By default is return traffic from inside network allowed via the DMZ interface |
|
Definition
Yep, reply traffic is allowed by default no matter the interface requesting |
|
|
Term
When the router is setup for login block-for what does the router go into |
|
Definition
|
|
Term
(IPsec VPN) What is the main job of a IPSec VPN access list |
|
Definition
decide if traffic is encrypted or not |
|
|
Term
Do SSL-based VPN's use hashes |
|
Definition
Yes, duh for integrity sake bro |
|
|
Term
Can SSL VPN's use asymmetric encryption |
|
Definition
|
|
Term
Where should root guard be used |
|
Definition
ports that should not receive BPDU. I.E - ports that are connected to switches which are not root bridges
(Otherwise legit BPDU's would shut down the switchport.) |
|
|
Term
What goes at the top of a ACL, specific or general entries |
|
Definition
Specific - don't worry about 'noise' on the network |
|
|
Term
Are router created packets filtered by host ACL's |
|
Definition
|
|
Term
4 kinds of IPv6 unicast address types are |
|
Definition
1&2. Link and site locals, 3. 6to4 (tunnels count as a unicast address type) 4. global unicast address |
|
|
Term
Defense in depth provides what kinda of security control |
|
Definition
|
|
Term
(IKE phases) The IKE policy is negotated in what phase |
|
Definition
phase 1 is where the ike policy is negotated |
|
|
Term
(IKE phases) Which phase supports quick mode |
|
Definition
|
|
Term
(IKE phases) Which phase negotiates the IPSec security parameters |
|
Definition
|
|
Term
(IKE phases) Which phase authenticates the peer using digital certs or PSK |
|
Definition
|
|
Term
Why would you use IOS IPS over the appliance |
|
Definition
a router knows the basic routing structure which can provides additional information and security |
|
|
Term
What automatic digital certificate management system is used with IPSec |
|
Definition
PKI - Public Key Infrastructure |
|
|
Term
Do ACL's applied to router interfaces only filter data passing through the router |
|
Definition
yes, only passing traffic is filtered with router ACL's. Since router generated traffic isn't filtered, in/out traffic must be passing through then to be filtered. |
|
|
Term
|
Definition
Generic routing encapsulation |
|
|
Term
|
Definition
Voice phishing - getting people to give deets over the phone |
|
|
Term
two things that stop STP root bridge attacks |
|
Definition
|
|
Term
|
Definition
|
|
Term
Do ACL's provide anti-spoofing protection |
|
Definition
yes, since it limits available ip addresses for proper network access |
|
|
Term
Does one-step lockdown disable unused ports |
|
Definition
no. you might need those for future switch expansion |
|
|
Term
Does / Can one-step lockdown enable ip express forwarding |
|
Definition
yes - provides for faster switching but possibility of loops |
|
|
Term
Does ipv6 have native IPSec |
|
Definition
Yes via the Virtual tunnel interface features |
|
|
Term
Does the PVLAN edge forward traffic between protected ports |
|
Definition
|
|
Term
Define non-designated ports |
|
Definition
ports not used to send BPDU |
|
|
Term
Does IronPort security gateways provide email encryption & spam protection |
|
Definition
|
|
Term
first requirement for role-base CLI |
|
Definition
enabling root view on routers |
|
|
Term
What default class map uses the INBOUND rule |
|
Definition
|
|
Term
|
Definition
|
|
Term
Cisco Security Manager (CSM) has what 3 application parts |
|
Definition
Config manager Event viewer Report Manager |
|
|
Term
2 key advantages of a app layer firewall |
|
Definition
resistant to DoS attacks and authenticates individuals |
|
|
Term
Is it best practice to place trunk ports in the native Vlan |
|
Definition
|
|
Term
What kind of encryption is IDEA, AES and 3DES |
|
Definition
|
|
Term
What kind of encryption is RSA |
|
Definition
|
|
Term
What creates a shared-secret key which only the 2 partners know |
|
Definition
|
|
Term
How many bits is the MD5 digest |
|
Definition
|
|
Term
What does Control Plane Policing (Cpp)use to protect the control plane against Dos attacks |
|
Definition
|
|
Term
preshared key IPsec VPN's need 4 things: 1. pre-shared key 2. interesting traffic 3. - 4. - |
|
Definition
3. Interfaces for the VPN connection 4. VPN Peer IP Address |
|
|
Term
What IPS term is used for the goal of alerting admin with actual problems and only responding if appropriate. with the result of reducing noise. |
|
Definition
|
|
Term
STP loop T-shoot requires what 2 things |
|
Definition
Topology of Switched network and location of root bridges |
|
|
Term
CLI - verify phase 2 of IPsec VPN |
|
Definition
|
|
Term
Does IPsec ESP transport mode authenticate a IP header |
|
Definition
|
|
Term
Does RADIUS use TCP or UDP |
|
Definition
|
|
Term
Does TACACS use IP or TCP (port 49) |
|
Definition
TCP 49, but supports the IP protocol |
|
|
Term
Main difference between dynamic NAT and dynamic PAT |
|
Definition
NAT = range of mapped IP addresses PAT = 1 address |
|
|
Term
(ZBFW) Port 1 - 3 and in zones Port 4 - 6 are not in a zone does traffic flow from port 4 to 5?
( in other words: does traffic flow among interfaces that are not explicitly assigned a-zone?) |
|
Definition
traffic between 'unzoned' interfaces are allowed, Traffic is NOT allowed from a assigned zone to a non assigned zone. (unless its return traffic) |
|
|
Term
|
Definition
Warning - Warning messages, not an error, but indication that an error will occur if action is not taken, e.g. file system 85% full - each item must be resolved within a given time. |
|
|
Term
|
Definition
Notice - Events that are unusual but not error conditions - might be summarized in an email to developers or admins to spot potential problems - no immediate action required. |
|
|
Term
|
Definition
Informational - Normal operational messages - may be harvested for reporting, measuring throughput, etc. - no action required. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Critical issue - Should be corrected immediately, but indicates failure in a secondary system, an example is a loss of a backup ISP connection. |
|
|
Term
|
Definition
Alert - Should be corrected immediately, therefore notify staff who can fix the problem. An example would be the loss of a primary ISP connection. |
|
|
Term
|
Definition
Emergency - System is unusable. |
|
|
Term
|
Definition
Every Alert Cisco Employee Will Need Information Daily (Level 0 - > 7 ) |
|
|
Term
VPN security policies fall under what kind of process policy |
|
Definition
|
|
Term
Which plane secures router acces 1. Data 2. Management 3. Control |
|
Definition
Management plane secures router access |
|
|
Term
What does the control plane do |
|
Definition
involves packets that are sent directly to the router (e.x. ospf updates) |
|
|
Term
(ZBFW) where are inspection policies applied |
|
Definition
|
|
Term
Does a ASA create partitions resulting in multiple virtual firewalls? |
|
Definition
|
|
Term
What is IOS image resilience (or what is the point of #secure boot-config) |
|
Definition
hide the image file in the show flash cmd |
|
|
Term
(CLI) what verifies aaa authentication? |
|
Definition
|
|
Term
(ASA CLI) what verifies aaa authentication |
|
Definition
test aaa-server authentication |
|
|
Term
does a IPS or IDS stream normalization techniques? |
|
Definition
Being inline, an IPS sensor can use stream normalization techniques to reduce or eliminate many of the network evasion capabilities that exist. |
|
|