Shared Flashcard Set

Details

CCNA SECURITY
NEED TO KNOW INFO
173
Computer Networking
Professional
02/25/2016

Additional Computer Networking Flashcards

 


 

Cards

Term
3DES Triple DES 
Definition



 Triple DES is a 168-bit (3 × 56-bit) encryption process. DES, or Data Encryption Standard, is a symmetric key encryption algorithm using a block-cipher method.

Term
Advanced malware protection (AMP)
Definition



Cisco advanced malware protection (AMP) is designed for Cisco FirePOWER network security appliances. It provides visibility and control to protect against highly sophisticated, targeted, zero-day, and persistent advanced malware threats.

Term
AES Advanced Encryption Standard 
Definition
 Advanced Encryption Standard is a symmetric key encryption algorithm using a block-cipher method developed by Joan Daemen and Vincent Rijmen. Available in key sizes of 128-bit, 192-bit, or 256-bit.
Term
amplification DDoS attacks
Definition



A form of reflected attacks in which the response traffic (sent by the unwitting participants) is made up of packets that are much larger than those that were initially sent by the attacker (spoofing the victim).

Term
Cisco AnyConnect
Definition
 Cisco’s secure mobility client solution, supporting full-tunnel VPN. Requires a small client on the workstation, but then tunnels all traffic through the SSL or IPsec tunnel, allowing other nonsecure protocols to be transported and secured.
Term
attack severity rating 
Definition



The amount of damage an attack can cause. It is used as one property of a signature inside an IPS/IDS.

Term
authentication method list 
Definition

 

The list of methods to be used for authentication (RADIUS, TACACS, enable password, Kerberos, vty line, or local database).

Term
authorization method list 
Definition

 

The list of methods to be used for authorization (RADIUS, TACACS, Kerberos, local database, or to pass if already authenticated). Used to specify what the authenticated user is authorized to do.

Term
C3PL Cisco Common Classification Policy Language. 
Definition


This promotes the concept of using class maps and policy maps to identify and provide specific treatment for traffic.

Term

 

CA Certificate authority.  

Definition
 A system that generates and issues digital certificates. This is usually a device that is trusted by both parties using certificates.
Term

CCP Cisco Configuration Professional.


 


Definition


CCP Cisco Configuration Professional. A web-based router administration tool with a GUI.


 

Term
What are CCP communities ?
Definition


Groups of routers presented together in CCP as a community of devices. A way to organize the devices being managed within CCP.

Term
CCP templates  
Definition
Sections of configurations that can be reapplied to multiple devices in CCP, substituting variables (such as a hostname) that are unique to each router.
Term
CCP user profiles  .
Definition
 Method to restrict what CCP displays to the administrator, thus limiting what the administrator can see and change through CCP.
Term
Cisco AnyConnect Secure Mobility Client full-tunnel VPN  
Definition

 The client is designed to protect users on computer-based or mobile platforms, providing a solution to encrypt IP traffic, including TCP and UDP.

Note:Clientless SSL VPNs only provide a way to encrypt TCP-based applications.


But Cisco AnyConnect Secure Mobility Client provides a full-tunnel VPN capability to encrypt TCP, UDP, and other protocols.

Term
Cisco public key 
Definition
The Cisco public key is needed for the IOS-based IPS to verify Cisco’s digital signature of the IPS signature package provided by Cisco.
Term
Cisco SIO 
Definition
Security Intelligence Operations. Early warning intelligence, threat and vulnerability analysis, and proven Cisco mitigation solutions to help protect networks.
Term
ClamAV 
Definition
An open source antivirus engine sponsored and maintained by Cisco and non-Cisco engineers.
Term
Class Map
Definition
 The portion of Modular Policy Framework (MPF) in the ASA, or C3PL on routers and switches, that defines what types of traffic belong to a certain class. Policy maps rely on class maps for the classification of traffic.
Term
class map type inspect 
Definition

 

This special type of class map defines specific classes and types of traffic to be used for further inspection in zone-based firewalls on IOS routers.

Term
clientless SSL VPN 
Definition
Allows for limited VPN resource access within some protocols that can natively support TLS, such as HTTPS and CIFS shared over HTTPS.
Term
cloud-based MDM deployment 
Definition
In a cloud-based MDM deployment, MDM application software is hosted by a managed service provider who is solely responsible for the deployment, management, and maintenance of the MDM solution.
Term
computer viruses 
Definition
A malicious software that infects a host file or system area to perform undesirable outcomes such as erasing data, stealing information, or corrupting the integrity of the system.
Term
context-aware security 
Definition

 

Security enforcement that involves the observation of users and roles in addition to things like interface-based controls. An example is an ACS providing full access to an administrator who is logged in from his local computer, but restricted access when that same user is logged in through a remote device or through a smartphone.

Term
control plane 
Definition


The control plane of a device handles packets that are generated by the device itself or that are used for the creation and operation of the network itself. Control plane packets always have a receive destination IP address and are handled by the CPU in the network device route processor.

Term
control plane policing (CoPP) 
Definition
A Cisco IOS-wide feature designed to enable users to restrict the amount of traffic handled by the route processor of their network devices.
Term
control plane protection (CPPr) 
Definition
A Cisco feature, similar to control plane policing, that can help to mitigate the effects on the CPU of traffic that requires processing by the CPU. CPPr has the capability to restrict traffic with finer granularity by dividing the aggregate control plane into three separate control plane categories known as subinterfaces.
Term
CRL Certificate revocation list.  
Definition
CRL - Used in a PKI environment to inform clients about certificates that have been revoked by the CA.
Term
custom privilege level 
Definition

 

Level 0 (user) and level 15 (enable) are predefined; anything in between (1–14) is custom privilege level.

Term
data plane 
Definition
The logic systems in a device that are responsible for the actual movement (post-decision) of information. End users sending traffic to their servers is one example of traffic on the data plane.
Term
DH group The Diffie-Hellman exchange  
Definition
The Diffie-Hellman exchange refers to the security algorithm used to exchange keys securely, even over an unsecured network connection. Groups refer to the lengths of the keys involved in the exchange. Group 1 is a 768-bit key exchange, Group 2 is a 1024-bit key exchange, and Group 5 is a 1536-bit key exchange. The purpose of this algorithm is to establish shared symmetrical secret keys on both peers. The symmetric keys are used by symmetric algorithms such as AES. DH itself is an asymmetrical algorithm.
Term
DHCP snooping 
Definition


DHCP snooping is a security feature that acts like a firewall between untrusted hosts and trusted DHCP servers.

Term
digital signature 
Definition

 

An encrypted hash that uniquely identifies the sender of a message and authenticates the validity and integrity of the data received. Signing is done with the private key of the sender, and validation of that signature (done by the receiver) is done using the public key of the sender.

Term
direct DDoS attacks 
Definition

 

The attacks occur when the source of the attack generates the packets, regardless of protocol, application, and so on that are sent directly to the victim of the attack.

Term
disabled signature 
Definition
A signature that is disabled. A signature needs to be both enabled and nonretired to be used by an IPS/IDS.
Term
downloaders 
Definition
A piece of malware that downloads and installs other malicious content from the Internet to perform additional exploitation on an affected system.
Term
dynamic ARP inspection (DAI) 
Definition
DAI is a security feature that validates ARP packets in a network. DAI intercepts, logs and discards ARP packets with invalid IP-to-MAC address bindings. This capability protects the network from some man-in-the-middle attacks.
Term
enabled signature 
Definition

 

A signature that is enabled. A signature needs to be both enabled and nonretired to be used by an IPS/IDS.

Term
EUI-64 Extended Unique Identifier-64 
Definition


is an IEEE standard for converting a 48-bit MAC address into a 64-bit host address in IPv6 networks. Used for stateless autoconfiguration.

Term
exploit 
Definition

 

A malicious program designed to “exploit” or take advantage of a single vulnerability or set of vulnerabilities.

Term
file retrospection 
Definition
After a malicious attempt or malware is detected, Cisco next-generation products (such as the Cisco ASA, Cisco WSA, and Cisco Next-Generation IPS) with AMP capabilities continue to cross-examine files over an extended period of time.
Term
file sandboxing 
Definition
If malware is detected, the Cisco AMP capabilities can put files in a sandbox to inspect its behavior, combining the inspection with machine-learning analysis to determine the threat level. Cisco Cognitive Threat Analytics (CTA) uses machine-learning algorithms to adapt over time.
Term
hash 
Definition
A unidirectional process rather than a reversible algorithm, it takes a variable-sized input and creates a fixed-size output. Common examples include MD5 and SHA.
Term
HMAC Hash Message Authentication Code, 
Definition

 

used to verify data integrity and authenticity of a message.

Term
identity certificate 
Definition


A digital certificate assigned to a device, host, person, or e-mail in a PKI infrastructure offering a concept of validated identity.

Term
Identity Services Engine (ISE) 
Definition

 

The Cisco ISE is a critical piece to the Cisco BYOD solution. It is the cornerstone of the authentication, authorization, and accounting (AAA) requirements for endpoint access, which are governed by the security policies put forth by the organization.

Term

What happens during IKE Phase 1?

Internet Key Exchange Phase 1

 


Definition


 The negotiation of the parameters for the IKE Phase 1 tunnel, including hash, DH group, encryption, and lifetime.


 

Term
Immunet
Definition

 

 A free community-based antivirus software maintained by Cisco Sourcefire.

Term
IPS (intrusion prevention system) 
Definition

 

Intrusion prevention systems, primarily using signature matching, can alert administrators about an attack on the network and can prevent the initial packet from entering the network.

Term
IPsec 
Definition

 

IPsec is the suite of protocols used to protect the contents of Layer 3 IP packets. ESP is the primary protocol used to encapsulate the Layer 3 packets 


Term
LDAP Lightweight Directory Access Protocol. 
Definition

 

This protocol can be used for gathering/managing information from an LDAP-accessible directory/database. An example of its use is having a AAA server use an LDAP request to Active Directory to verify the credentials of a user.

Term
LLDP (Link Layer Discovery Protocol)
Definition

 

 LLDP was developed by Cisco and others within the Internet and IEEE community as a new, standardized discovery protocol, 802.1AB. Similar to CDP, LLDP defines basic discovery capabilities and was enhanced to specifically address the voice application.

Term
logic bombs 
Definition

 

A type of malicious code that is injected to a legitimate application. An attacker can program a logic bomb to delete itself from the disk after it performs the malicious tasks on the system.

Term

1. mailers and mass-mailer worms 


2. malvertising 

Definition

1. A type of worm that sends itself in an e-mail message.




2. This is the act of incorporating malicious ads on trusted websites, which results in users’ browsers being inadvertently redirected to sites hosting malware.

Term
management plane
Definition
 The management plane refers to traffic and technologies involved in being able to manage the network and its devices. This could include management sessions with SSH, HTTPS, and so on, and could also include information-gathering tools such as SNMP or NetFlow.
Term
MD5 
Definition
Message digest algorithm 5 is a cryptographic function with a 128-bit hash. Hashing algorithms are unidirectional. The enable secret on an IOS router is stored using an MD5 hash.
Term
MD5 route authentication 
Definition

 

MD5 hashing is applied to the authentication of routing updates between routers to ensure the integrity of routing protocol updates. MD5 route authentication is available for OSPF, EIGRP, RIPv2, and BGP.

Term
MPF Modular Policy Framework. 
Definition

 

A newer technique using the class map and policy map framework to bring about all sorts of manipulations or additional functions to a router. This is what the ASA refers to when using class maps, policy maps, and the service policy commands. On an IOS router, these are referred to as C3PL components.

Term
NFP Network foundation protection. 
Definition
The concept of breaking down the network into functional components, such as control plane, management plane, and data plane, and then providing protection for each of those components.
Term
PFS Perfect Forward Secrecy. 
Definition

 

New keys within DH are not based on seeds from previous keys when PFS is enabled, further increasing security. PFS is associated only with IKE Phase 2.

Term
  1. PKCS#10 Public Key Cryptography Standards #10  
  2. PKCS#12 Public Key Cryptography Standards #12
  3. PKCS#7 Public Key Cryptography Standards #7 
Definition
  1. Public Key Cryptography Standards #10 is a file format used when sending certificate requests to a CA.
  2.  Public Key Cryptography Standards #12 is a file format used to store private keys with accompanying public key certificates.
  3. Public Key Cryptography Standards #7 is used by a CA to distribute digital certificates.
Term
PKI Public key infrastructure. 
Definition

 

A scalable architecture that includes software, hardware, people, and procedures to facilitate the management of digital certificates.

Term

1. policy map 

2. policy map type inspect 

Definition

1. The portion of MPF or C3PL that defines what actions occur to traffic belonging to each class.


2. The policy map type is associated with Zoned-Based Firewalls on the IOS. The ASA also has specific purpose policy maps for deep packet inspection.



Term

1. qualitative 

 

2. quantitative 

Definition

1. A method of risk assessment that uses a scenario model, including expert opinion.


2.    A method of risk assessment that uses a mathematical model based on data.

Term
ransomware 
Definition

 

A type of malware that compromises a system and then often demands a ransom from the victim to pay the attacker for the malicious activity to cease or for the malware to be removed from the affected system.

Term
root certificate 
Definition
The certificate at the top of a certificate hierarchy in PKI.
Term
rootkits 
Definition
A set of tools that an attacker uses to elevate their privilege to obtain root-level access and completely take control of the affected system.
Term
RSA 
Definition
In 1977, Rivest, Shamir, and Adleman developed a public key algorithm still used by most browsers today. This is an asymmetrical algorithm used for authentication.
Term
SCEP Simple Certificate Enrollment Protocol. 
Definition

 

SCEP was created to facilitate large-scale deployments of PKI, by automating the process of authenticating and enrolling with a CA that supports SCEP. This is a Cisco-sponsored protocol and is supported by some, but not all, other vendors.

Term
secure bootset 
Definition
Part of the Cisco IOS Resilient Configuration feature, preventing the erasure of IOS files from a storage device, such as flash or NVRAM.
Term
What is Secure Copy (SCP)? 
Definition
A feature that provides a secure and authenticated method for copying device configurations or device image files.
Term
What is SecureX?
Definition
Cisco’s security framework to establish and enforce security policies across a distributed network.
Term
What is a service policy?
Definition
Just like in MQC for quality of service (QoS), this is the device that ties a policy to an interface (QoS) or to a zone pair (ZBF). On an ASA, this is the command element that links a policy to one or more interfaces.
Term
What is a SFR Signature fidelity rating?
Definition
An IPS measurement of the degree of attack certainty related to that signature correctly indicating the attack on which it is supposed to match.
Term
What is SHA1 Secure Hash Algorithm 1?
Definition
A successor to MD5, developed by the National Security Agency (NSA).
Term
What does the 'show ip cef' command do? 
Definition

 

The output of this command displays the IP prefixes of the packets that will be received and handled by the control plane (CPU) of the device.

Term
What does the 'show policy-map control-plan' command do? 
Definition

 

The output of this command provides the status of the policy that has been applied to the control plane.

Term
What is SSL- Secure Sockets Layer? 
Definition

 

is the original security method for HTTPS. Although succeeded by TLS, this term is still widely used and assumed. This is a secure alternative to HTTP.

Term

What is the difference between standard/extended ACLs? 

Definition
Access control list for packet filtering, set up by number. ACLs 1–100 are standard (source IP only), and 100–199 are extended (source and destination IP as well as port information). ACLs 1300–1999 are also standard ACLs, and 2000–2699 are also extended ACLs.
Term
What is stateful filtering?
Definition
More than just a simple packet-filter check, stateful inspection can determine whether a network flow exists and can look at information up to the application layer. A stateful filtering firewall dynamically allows the return traffic to the user, from the server they were accessing on the other side of the firewall. This is implemented in the ASA firewall and in the zone-based firewall feature on an IOS router.
Term
what are symmetrical keys? 
Definition
Literally meaning both sides are the same, such as with pre-shared keys, where both ends have the exact same information used to encode/decode data. DH produces symmetrical keys. Symmetrical keys are used by symmetrical algorithms, such as AES, where one key encrypts the data and the same key is used to decrypt the data.
Term
What is a SYN flood attack?
Definition
An exploit against TCP’s three-way handshake opening lots of sessions via the initial SYN packet with no intent of replying to the SYN-ACK and completing the session. This leaves half-open, or embryonic, connections and can overflow a server’s session table.
Term
syslog 
Definition
Logging messages can be sent to a syslog server that gathers all incoming messages into text files. Syslog server programs can sort by incoming device IP address and by severity/facility levels to make security monitoring simpler.
Term
TLS Transport Layer Security. 
Definition
Based on SSL, but more widely adopted as an IETF standard in RFC 5246.
Term
Traffic Light Protocol (TLP) 
Definition
A set of designations developed by the US CERT to ensure that sensitive information is shared with the correct audience.
Term
transform set 
Definition
A set of secure protocol parameters to be used by IPsec in IKE Phase 2. To properly peer, both sides must agree on a common set.
Term
Transparent firewall 
Definition
Firewall implemented at Layer 2 of the OSI model, but still including the ability to analyze traffic at Layer 3 and higher.
Term
Trojan horses 
Definition
A type of malware that executes instructions determined by the nature of the Trojan to delete files, steal data, and compromise the integrity of the underlying operating system.
Term
uRPF Unicast Reverse Path Forwarding. 
Definition

 

Comparing the entry point of a packet’s source address against the routing table and making sure the ingress interface matches what the egress interface would be to reach the source of the packet. If the interface does not match, the router assumes the source address is bogus (spoofed) and can drop the packet.

Term
worms 
Definition
Viruses that replicate themselves over the network, infecting numerous vulnerable systems. In most occasions, a worm will execute malicious instructions on a remote system without user interaction.
Term
X.509v3 
Definition
The ITU standard for PKI. Version 3 typically refers more to the IETF standard (RFC 3280), which includes CRL usage.
Term
zone pairs 
Definition
The traffic flow, for initial traffic, unidirectionally between two zones. An example is a zone pair that begins in the inside zone and goes to the outside zone. Policies can then be applied to initial traffic that is moving in the direction of the zone pair (in this case, from inside to outside).
Term
zones 
Definition
The grouping of multiple interfaces under a similar security policy together, such as inside or outside.
Term
Purpose for the four classification levels used within the Traffic Light Protocol (TLP).
Definition

It employs four colors to indicate different degrees of sensitivity and the corresponding sharing considerations to be applied by the recipients.


Red

Amber

Green

White

Term
Cisco and others have created databases that categorize threats in the public domain. The Common Vulnerabilities and Exposures (CVE) is a dictionary of publicly known security vulnerabilities and exposures
Definition
National Vulnerability Database (NVD), which is a repository of standards-based vulnerability information
Term
Common control methods used to implement countermeasures include the following:
Definition

Administrative:  Administrative controls could involve items such as background checks for users


Physical: controls are exactly what they sound like,


Logical: often referred to as technical controls.

Term
What is a Man-in-the-Middle Attack?
Definition

Its results when attackers place themselves in line between two devices that are communicating, with the intent to perform reconnaissance or to manipulate the data as it moves between them.


Note:This can happen at Layer 2 or Layer 3.


The main purpose is eavesdropping, so the attacker can see all the traffic.

Term
Layer 2 MitM
Definition

the attacker spoofs Layer 2 MAC addresses to make the devices on a LAN believe that the Layer 2 address of the attacker is the Layer 2 address of its default gateway. This is called ARP poisoning


Frames that are supposed to go to the default gateway are forwarded by the switch to the Layer 2 address of the attacker on the same network

To mitigate this risk, you could use techniques such as dynamic Address Resolution Protocol (ARP) inspection (DAI) on switches to prevent spoofing of the Layer 2 addresses.

Term
Layer 2 MitM -1
Definition

The attacker could also implement the attack by placing a switch into the network and manipulating the Spanning Tree Protocol (STP) to become the root switch (and thus gain the ability to see any traffic that needs to be sent through the root switch). You can mitigate this through techniques such as root guard and other spanning-tree controls 

Term
Layer -3 MitM attacks
Definition

A man-in-the-middle attack can occur at Layer 3 by a rogue router being placed on the network and then tricking the other routers into believing that the new router has a better path. This could cause network traffic to flow through the rogue router and again allow the attacker to steal network data. You can mitigate attacks such as these in various ways, including routing authentication protocols and filtering information from being advertised or learned on specific interfaces.

Term
Man-in-the-Middle Attacks -general
Definition

To safeguard data in motion, one of the best things you can do is to use encryption for the confidentiality of the data in transit.


Using management protocols that have encryption built in, such as Secure Shell (SSH) and Hypertext Transfer Protocol Secure (HTTPS), is considered a best practice, and using VPN protection for cleartext sensitive data is also considered a best practice.

Term
TLP -RED
Definition

Used when info cannot be effectively acted upon by additional parties

 

Note: Recipients may not share info w/ outside parties

Term
TLP -RED
Definition

Used when info cannot be effectively acted upon by additional parties

 

Note: Recipients may not share info w/ outside parties

Term
TLP-AMBER
Definition

Used when info required support to be effectively acted upon, but carries risk to privacy, reputation, or operations

 

Note: Recipients may only share info w/ members of their own organization parties

Term
TLP-GREEN
Definition

Used when info is useful for the awareness of all participating organizations as well as peers in boarder sectors

 

Note: Recipients may share info w/ peer or partner organizations w/in sector, but not via publicly accessible channels

Term

Network Security Threat Landscape

Definition

Financial:There are several different means in which attackers can make financial gains through their malicious actions.


 Disruption: Unfortunately, many individuals and groups exist solely to cause disruption to the core business of many organizations and institutions.


Geopolitical: Not surprisingly, there are groups affiliated with certain nation states that leverage the Internet to engage in cyber warfare.

Term

Distributed Denial-of-Service Attacks


DDoS attacks can generally be divided into the following three categories:

Definition

Direct:  Direct DDoS attacks occur when the source of the attack generates the packets, regardless of protocol, application, and so on, that are sent directly to the victim of the attack.


Reflected: Reflected DDoS attacks occur when the sources of the attack are sent spoofed packets that appear to be from the victim, and then the sources become unwitting participants in the DDoS attacks by sending the response traffic back to the intended victim. UDP is often used as the transport mechanism because it is more easily spoofed


Amplification: Amplification attacks are a form of reflected attacks in which the response traffic (sent by the unwitting participants) is made up of packets that are much larger than those that were initially sent by the attacker (spoofing the victim).

Term
            Defenses Against Social Engineering
Definition

Password management: 

Two-factor authentication: 

Antivirus/antiphishing defenses:

Change management:

Information classification:

Document handling and destruction:

Physical security:

Term

Malware Identification Tools

Definition

Several factors make this identification particularly difficult:


    1. The sheer amount of malware 


2. Malware is often embedded in otherwise-trusted applications and sent over allowed protocols 


3. limited resources  to keep up with the massive amounts of traffic that traverse the network.


4.  use of encryption has, not surprisingly, added another layer of complexity( can't see into traffic)


Term
Methods Available for Malware Identification
Definition

1. Packet captures:

2. Snort IDS/IPS

3. NetFlow:  often referred to as micro-analytical 

4. IPS events: 

5. Advanced Malware Protection: Cisco (AMP)

6NGIPS: The Cisco FirePOWER 


Term

What is NetFlow?

Definition


-Packet capture is often referred to as "micro-analytical" in terms of the granularity of data being analyzed, but


--NetFlow data is considered more of a macro-analytical approach.


-consists of the creation of buckets or flows of data that are based on a set of predefined parameters such as source IP address, source port, destination IP address, destination port, IP protocol, ingress interface, and type of service (ToS)

 

Term

What is Advanced Malware Protection: Cisco Advanced Malware Protection (AMP)

Definition

 It is designed for Cisco FirePOWER network security appliances.


It provides visibility and control to protect against highly sophisticated, targeted, zero-day, and persistent advanced malware threats. 


Helps to identify inconspicuous attacks by continuously analyzing and monitoring files after they’ve entered the network, utilizing retrospective security alerts 

Term
What is The Cisco FirePOWER next-generation intrusion prevention system (NGIPS) solution
Definition

Provides multiple layers of advanced threat protection at high inspection throughput rates.


Centrally managed through the Cisco FireSIGHT Management Center


Can be expanded to include additional features such as AMP, application visibility and control, and URL filtering.

Term

Data Loss and Exfiltration  protection Methods

Definition

1. involves a combination of clearly communicated and effective security policies


2. employee education


3. the technologies to help ensure that the security policies put in place can be enforced.

Term
 Access Control Server (ACS)
Definition

centralized database where all the usernames and passwords are kept for authentication and what the individual users are allowed to do (the authorization portion of AAA)


use ACS for the authentication and authorization components

Term
What Is ISE?
Definition

1. it is an identity and access control policy platform


2. it can validate that a computer meets the requirements of a company’s policy related to virus definition files, service pack levels, and so on before allowing the device on the network.


3.  can use ISE (in addition) for the posturing and policy-compliance checking for hosts.

Term
How to configure the router to forward authentication questions to the ACS server 
Definition

The router acts as a client to the ACS server.


Note: Two main protocols may be used between the ACS server and its client

TACACS+(TACACS+ is Cisco proprietary) which encrypts each packet before it is sent on the network


RADIUS (is an open standard), which means that not only ACS supports it but also that other vendors -RADIUS encrypts only passwords, but not the whole packet being sent between the ACS server and the network device.

Term
Assets, vulnerabilities, and threats
Definition

an Asset is anything of value to your company or organization

An assets value can be quantitative in dollar terms or qualitative

 

A vulnerability can be known or unknown okay, but it's basically a weakness in a system or a system design, or weakness in a protocol or a service that can be exploited by a threat or a threat agent

Note: if the vulnerability is theoretical and it hasn't been exploited, then we call that an unrealized threat or a latent threat


 

A threat is a potential danger to assets, okay. A threat is realized if it's identified by a specific vulnerability and it's exploited, okay, and that exploit is called a threat agent, it's the delivery system of that threat

Term
Classifying Assets
Definition

Note: Not all assets have the same inherent value. The purpose of information classification is to provide the appropriate confidentiality, integrity, and availability.

Three main benefits to information classification.

1. It demonstrates the commitment of an organization to security.

2. It identifies the assets that are the most sensitive.

3. And it identifies which countermeasures apply to which information.

Term
Classifying Assets (cont'd)
Definition

Public Sector: Unclassified, SBU or Sensitive but Unclassified, Confidential, Secret, and Top Secret.


Private Sector: Public, Sensitive, Private, and Confidential.



Criteria used for classification: Value, Age, Useful Life, Personal Association, Replacement Cost, and Liability.

Roles: Owner, Custodian, and User.



Term

Confidentiality, Integrity, and Availability


CIA “triad”

Definition

Confidentiality: There are two types of data: data in motion as it moves across the network; and data at rest, when data is sitting on storage media


       Note: It means that only the authorized individuals/systems can view sensitive or classified information.


Integrity:Integrity for data means that changes made to data are done only by authorized individuals/systems.


Availability: This applies to systems and to data. If the network or its data is not available to authorized users—


        Note:The failure of a system, to include data, applications, devices, and networks, generally equates to loss of revenue.


Term
What is an Asset?
Definition
It is anything that is valuable to an organization
Term
What is a Vulnerability?
Definition
 is an exploitable weakness in a system or its design.
Term
What is a Threat?
Definition
is any potential danger to an asset.
Term
What is a countermeasure?
Definition
is a safeguard that somehow mitigates a potential risk.
Term
What are the 4 colors of the TLP?
Definition

Red

Amber

Green

White

 

Term
Who developed the Traffic Light Protocol and Why?
Definition

 

Developed by US-CERT division to ensure that sensitive information is shared with the correct audience

Term
What are the Govenment Classification levels?
Definition

Unclassified

SBU

Confidential

Secret

TopSecret

Term
What are the Private sectors Classification levels?
Definition

Public

Sensitive

Private

Confidential

Term
What are the "four" classification criteria?
Definition

Value

Age

Replacement Cost

Usefull Lifetime

Term
What are some Potential network vulnerabilities?
Definition

 

Policy flaws

 Design errors

 Protocol weaknesses

 Misconfiguration

 Software vulnerabilities

 Human factors

 Malicious software

 Hardware vulnerabilities

 Physical access to network resources

 

Term
What is the Common Vulnerabilities and Exposures (CVE)
Definition
It is a dictionary of publicly known security vulnerabilities and exposures. A databases that categorize threats in the public domain.
Term
What is the National Vulnerability Database (NVD)
Definition
It is a repository of standards-based vulnerability information
Term
What are the "3" types pf countermeasures often used to reduce risk to and asset?
Definition

Administrative:

Physical:

Logical:

Term
What is an example of an administrative countermeasure?
Definition
The written policies, procedures, guidelines, and standards. An example would be a written acceptable use policy (AUP)
Term

What is an example of an Physical countermeasure?

 

Definition

 Physical security for the network servers, equipment, and infrastructure.

 

An example is providing a locked door between users and the wiring closet

Term

What is an example of an Logical countermeasure?

 

 

Definition

 include passwords, firewalls, intrusion prevention systems, access lists, VPN tunnels, and so on.

 

often referred to as "technical controls."

Term
Who are some of the potential threat to enterprise security?
Definition

Terrorists

[image] Criminals

[image] Government agencies

[image] Nation states

[image] Hackers

[image] Disgruntled employees

[image] Competitors

[image] Anyone with access to a computing device

Term
What are some of the "attack methods" used in an compromise?
Definition

Reconnaissance

Social Engineering

Privilege Escalation

Backdoors

Code Execution

 

Term
What is a Man-in-the-Middle Attack?
Definition

When attackers place themselves "in line between" two devices that are communicating, with the intent to perform reconnaissance or to manipulate the data as it moves between them.


It can happen at Layer 2 or Layer 3.


Note:The main purpose is eavesdropping, so the attacker can see all the traffic.

Term
What is a layer two MitM attack called?
Definition
ARP poisoning
Term

How can you prevent MitM attacks at layer 2 and ARP poisoning?

 

Definition

With Dynamic Address Resolution Protocol (ARP) inspection (DAI) on switches to prevent spoofing of the Layer 2 addresses.


DAI

Term

What is another layer2 MitM attack frequently used?

 

How is it mitigated?

Definition

manipulating the Spanning Tree Protocol (STP) to become the root switch (and thus gain the ability to see any traffic that needs to be sent through the root switch).

 

Cisco RootGuard

Term
What is the best way to safeguard data in motion?
Definition
encryption for the confidentiality of the data
Term
What are two secure protocols used for device  management?
Definition
SSH and HTTPS
Term
Allowing on the minimal access required is an example of what?
Definition
Rule of Least Privilege
Term
WHat is a Campus-Area Network (CAN)?
Definition

The network topology used to provide connectivity, data, applications, and services to users of an organization that are physically located at the corporate office (headquarters).

 

Note: CAN includes a module for each building in the campus, for the data center, for WAN Aggregation, and for the Internet Edge. Security with the Campus Area Network.

 

Term
What is a Cloud, Wide-Area Network (WAN)?
Definition

 


It provide a logical and physical location for data and applications that an organization prefers to have moved off-site


Note: It alleviates an organization from having to expend resources to operate, maintain, and manage the services that have been previously located within the organization’s purview.

 

Term
What is a Data Center?
Definition

It is a network that  contains the Unified Computing System (UCS) servers, voice gateways, and CUCM servers supporting the VoIP environment, all of which is provided network connectivity by a series of Nexus switches


Note: it is protected by a set of firewalls at the edge that filters all traffic ingressing and egressing.

Term
What is a Small office/Home office (SOHO)?
Definition

The remote site will provide connectivity to the remote users through the use of WAN routers that find their way back to the WAN Aggregation module in the CAN via MPLS WANs


Note: users are provided network connectivity through the presence of access switches

Term
What is Application Centric Infrastructure (ACI)?
Definition

A centralized application-level policy engine for physical, virtual, and cloud infrastructures.


It reduces administrative overhead and improve flexibility and operational efficiency

 

Term
What is the benefit of the Cisco ASAv?
Definition

It provides detailed visibility and control of application and services within the virtual environment.


and it defines the concept of east-west versus north-south traffic.



Term

What is the major challenge you have when trying to use physical appliances or firewall to protect a virtualized environment?

Definition
sometimes the traffic does not leave the physical server ans as a result is not monitor or analyzed.
Term
What are the motivations behind all  threat actors?
Definition

Financial

Disruption

Geopolitical

Term
What are the types of Distributed Denial-of-Service Attacks?
Definition

DDoS attacks can generally be divided into the following three categories


1. Direct: Direct DDoS attacks  are sent directly to the victim of the attack.


2. Reflected: Reflected DDoS attacksoccur when the sources of the attack are sent spoofed packets that appear to be from the victim, and then the sources become unwitting participants in the DDoS attacks by sending the response traffic back to the intended victim. --UDP is often used as the transport mechanism  


3.Amplification: Amplification attacks are a form of reflected attacks in which the response traffic (sent by the unwitting participants) is made up of packets that are much larger than those that were initially sent by the attacker (spoofing the victim).




Term
What happens during (IKE-2)Internet Key Exchange Phase 2 ?
Definition

It builds the actual IPsec tunnel. This includes negotiating the transform set for the IPsec SA.

 

Term
What are some Social Engineering Methods and Tactics?
Definition

 Phishing

Malvertising

Phone scams

Term
What are some Defenses Against Social Engineering?
Definition

Password management

Two-factor authentication

Antivirus/antiphishing defenses

Change management

Information classification

Document handling and destruction

Physical security

Term
Why is Malware Identification so difficult?
Definition

The sheer amount of malware that exists and is created on a daily basis is almost incomprehensible often making signature-based detection tools useless.


Malware is often embedded in otherwise-trusted applications and sent over protocols that are traditionally allowed through firewalls and access lists


Organizations have limited resources (both human and technology) to keep up with the massive amounts of traffic that traverse the network


increasing use of encryption has added another layer of complexity

Term
What Methods are Available for Malware Identification?
Definition

Packet captures

Snort

NetFlow

IPS events

Advanced Malware Protection

NGIPS

Term
What is flash used for?
Definition
Stores the IOS Image
Term
What is NVRAM used for?
Definition
Stores the Startup config
Term
What is the purpose of system:  memory
Definition

System RAM, stores the running configuration

 

Term
What are the two command used to setup IOS Resilient Configuration?
Definition

1."secure boot-image,"

2."secure boot-config"

 

Term

What does the command secure boot-image do?

Definition

1. It enables the secure boot -image feature

2. It secures the running image

     a. maintained in flash, no longer can be   

         displayed by with the dir command.

    b. cannot be deleted via the command line

Term

What does the command "secure boot-config" do ?

Definition

1.It copies running config to secured storage area

 

2. Secured IOS image and configuration is     called the 'secure bootset'

Term

What is a Management Information Base(MIB) ?

Definition

1. A database of network management information that is used and maintained by a network management protocol, such as SNMP or CMIP.


2.  MIB objects are organized in a tree structure that includes public (standard) and private (proprietary) branches.

Term
What commands allow you to verify aaa settings?
Definition

Test aaa

debug aaa

 

Term
What is Diffie-hellman key exchange?
Definition
It uses public-private key pair asymmetrical algorithm.... But creates final shared secrets(keys) that are then used by symmetrical algorithms.
Term
What is a Reflected DDoS attack?
Definition

1. occur when the sources of the attack are sent spoofed packets that appear to be from the victim

 

  2. Responses are sent to the legitimate source 

Note: Often done via UDP


Term
What is an Amplification attack?
Definition
It is form of reflected attacks in which the response traffic (sent by the unwitting participants) is made up of packets that are much larger than those that were initially sent by the attacker (spoofing the victim).
Term
What are some examples of Social Engineering Attacks?
Definition

Phishing

Malvertising

Phone scams

Term
What is Netflow?
Definition

It is Packet capture is often referred to as micro-analytical in terms of the granularity of data being analyzed.


it's based on a set of predefined parameters such as source IP address, source port, destination IP address, destination port, IP protocol, ingress interface, and type of service (ToS)



Supporting users have an ad free experience!