CCSG Ch 13 Security CH 14 HSRP

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/89

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

90 Terms

1
New cards

Reconnaissance attacks

Access Attacks

Denial of Service Attacks

What are the 3 primary network attacks

2
New cards

an unauthorized familiarization session. Mapping the network, its resources, systems and vulnerabilities for future attacks.

Reconnaissance attacks

3
New cards

are against networks or systems to retrieve data, gain accesses or escalate privileges.

Access attacks

4
New cards

an attack that deny users access network resources. Their sole purpose is to disable or corrupt network services. The result will be to either crash a system or slow it down to the point where it is useless.

The basic idea is to keep open all connections supported by a key server.

DoS attacks are often run with common internet protocols like TCP and ICMP

Denial of Service Attacks

5
New cards

a type of attack also called network snooping and packet sniffing. Used for stealing info and identities.

To counteract eavesdropping create a policy forbidding the use of protocols with known susceptibilities to eavesdrop and make sure all sensitive, important network traffic is encrypted.

eavesdropping

6
New cards

Chargen Massive amount of UDP packets causing congestion

SYN flood-randomly opening TCP ports

Packet fragmentation and reassembly

accidental

email bombs

Land.c uses the TCP SYN packet and makes source/destination the same address causing system to crash

Types of DoS attacks

7
New cards

CBAC - Context Based Access Control provides advanced traffic filtering services and can be used as an integral part of your ntwk firewall

Java blocking

DoS detection and monitoring

Audit trails

Real time alerts log

Cisco firewall features to help combat DoS attacks

8
New cards

The Cisco TCP Intercept feature implements software to protect TCP servers from a type of DoS attack called TCP SYN-flooding

The Cisco TCP Intercept feature implements software to protect TCP servers from a type of DoS attack called TCP SYN-flooding

9
New cards

Terminal Access Controller Access Control System is a Cisco remote authentication server that uses TCP. It was later released as an open standard. It has multiprotocol support.

Authorization enables explicit control over user capabilities

Accounting supplies detailed information about user activities.

Authorization and accounting are separate.

Authentication includes messaging support in addition to login and password function

TACACS+

10
New cards

is when someone outside network pretends to be a trusted computer by using an ip address within the range of your network IPs

another name would be Masquerade Attack

Combated by ACLs on internet facing interfaces

IP Spoofing

11
New cards

program that repeatedly attempts to ID a user account and password.

brute force attack

12
New cards

a challenge-response authentication method used in Point-to-Point Protocol (PPP) to verify the identity of a remote user accessing a network, without exposing the password

Challenge and Handshake Protocol

CHAP

13
New cards

Repudiation

a denial of a transaction so that no communication can be traced by erasing or altering logs to hide the trail providing deniability.

This type of attack can be guarded against with setting your browsers security setting to high, block corporate access to public email sites. In addition add access control and authentication on your network.

14
New cards

is an attack when a hacker changes the routing table of the targeted router. To alter the course of IP packets so they’ll go to the attackers unauthorized destination instead.

Rerouting can be stopped with a Cisco ASA or Cisco Firepower Device

Rerouting

15
New cards

a Cisco security device that combines firewall, antivirus, intrusion prevention, and VPN capabilities

Adaptive Security Appliances

Cisco ASA

16
New cards

session hijacking/ replaying can be defended with by using strong authentication and encrypted management protocols.

session hijacking/ replaying can be defended with by using strong authentication and encrypted management protocols.

17
New cards

non-repudiation

a security principle that ensures a party cannot deny having sent or received a message or performed an action, crucial for maintaining trust and accountability in digital interactions and transactions.

18
New cards

a type of denial-of-service (DoS) attack where an attacker floods a target with ICMP (Internet Control Message Protocol) echo reply packets by spoofing the source address to appear as the victim's IP address. 

Can be guarded against with filtering either at the edge of the network where customers connect or sit the edge with connections to upstream providers

Smurfing

19
New cards

a denial-of-service (DoS) attack that involves sending a large amount of spoofed UDP traffic to a router's broadcast address within a network. It is very similar to a Smurf Attack, which uses spoofed ICMP traffic rather than UDP traffic to achieve the same goal.

Fraggle

20
New cards

a type of attack where the attacker must have access to network packets traveling across the networks. This means your middleman could be an internal user, someone who spoofed or even someone within the ISP.

Man in the Middle

21
New cards

An attack that involves an application with a well known weakness that can be easily exploited. Sendmail, PostScript and FTP are a few examples. The idea is to gain access to a computer with the permission of the account running the application, which is usually a privileged, system level account.

Application layer attack

22
New cards

any malware that disguises itself as a needed application while carrying out malicious actions

trojan horse

23
New cards

an attack that is run thru a browser often using JAVA Applets or ActiveX controls. The attacker modifies a setting or program that then starts the attack when the user initiates the program/setting

HTML attacks

24
New cards

Pharming is similar to phishing only pharming pollutes the contents of a computers DNS cache so that requests to a legitimate site are actually routed to an alternate one.

Pharming is similar to phishing only pharming pollutes the contents of a computers DNS cache so that requests to a legitimate site are actually routed to an alternate one.

25
New cards

Any malware that replicates itself but doesn’t need another application or human interaction to propagate.

Worm

26
New cards

any malware that attaches itself to another application to replicate or distribute itself

Virus

27
New cards

Any malware that collects private user data, including browsing history or keyboard input.

Spyware

28
New cards

a type of Physical access control where the person who wants in is physically authenticated at the first door, enters into a room. The door closes and additional verification is performed before a 2nd door is opened.

mantrap

29
New cards

a type of Physical access control method where RFID badge are card must be in the possession of the user to swipe in order to gain access to resource.

Badge

30
New cards

a fancy badge often times need a password or pin to gain access

Smart Card

31
New cards

Think of the 3 barriers this way, Outer barrier =fence, Middle Barrier = Guards, locks and mantraps and Inner barrier would be key/fob or smart card.

Think of the 3 barriers this way, Outer barrier =fence, Middle Barrier = Guards, locks and mantraps and Inner barrier would be key/fob or smart card.

32
New cards

Continued use of ACL and policies from the distribution layer

Creation of separate collision domains and micro segmentation

Workgroup connectivity into the distribution layer

Device connectivity

Resiliency and security services

advanced technological capabilities (voice/videos, PoE, port-security, QoS, etc)

Gigabit Switching

The access layer is where user devices connect to the network and its also the connection point between the network and client devices.

Access Layer functions

33
New cards

Note ISE (Identity Service Engine) and DNA (Digital Network Architecture) center are Identity Based Networking products from Cisco

Note ISE (Identity Service Engine) and DNA (Digital Network Architecture) center are Identity Based Networking products from Cisco

34
New cards

Port Security -restricts a port to a specific set of MAC addresses

DHCP Snooping

Dynamic ARP inspection

Identity Based Networking

What are some ways to protect the access layer

35
New cards

Layer 2 security feature that validates DHCP messages by acting like a firewall between trusted hosts and untrusted DHCP servers. When enabled switch interfaces are configed trusted/untrusted. Trusted interfaces allow all types of DHCP messages but untrusted interfaces only permit requests. Trusted interfaces connect to legitimate DHCP server or uplink toward one.

With DHCP Snooping enabled , a switch builds a DHCP Snooping Binding database containing the MAC, IP of the host, DHCP lease times, binding type, VLAN and interface. Dynamic ARP Inspection also uses the DHCP Snooping Binding Database

DHCP Snooping

36
New cards

a concept that ties together several authentication, access control and user policy components to provide users with only the network services you want them to access.

Identity Based Networking

37
New cards

Cisco’s best next generational firewall. The Firewall Threat Defense can be used to send authentication to the server

Cisco FTD

38
New cards

RADIUS

TACACS+

Kerberos

What are the 3 types of security server protocols supported by Cisco routers?

39
New cards

developed by IETF and uses only UDP. Is an open standard that combines authentication and authorization into a single process. In other words cannot separate services.

Remote Authentication Dial in User Service

RADIUS

40
New cards

Accept - UN/PW are valid

Reject - UN/PW not valid

Challenge -The RADIUS server requests additional info

Change password - user should select new PW

What are the different RADIUS responses and their meaning

41
New cards

Remember RADIUS encrypts only the PW in the access-request packet, from the client to the server, the remainder of the packet is unencrypted.

Remember RADIUS encrypts only the PW in the access-request packet, from the client to the server, the remainder of the packet is unencrypted.

42
New cards

router(config)# aaa new-model

what command will enable AAA services

43
New cards

the aaa new-model cmd immediately applies local authentication to all lines and interfaces except con 0. So to avoid being locked out of the router you should define a local username and password before AAA configuration

the aaa new-model cmd immediately applies local authentication to all lines and interfaces except con 0. So to avoid being locked out of the router you should define a local username and password before AAA configuration

44
New cards

user awareness

training

physical security

what are the 3 elements to a security program

45
New cards

router(config)# aaa new-model

router(config)# username Mike password Password

router(config)# radius server SecureLogin

router(config-radius-server)#address ipv4 10.10.10.254

router(config-radius-server)#key MyRadiusPW

router(config)#aaa authentication login default group MyRadiusGroup local

Config RADIUS server named SecureLogin with an address of 10.10.10.254 and a key of MyRadiusPW. Set it up that if the RADIUS server fails the fallback is local authentiacation.

46
New cards

understand that authentication and authorization are treated as separate processes in TACACS+.

understand that authentication and authorization are treated as separate processes in TACACS+.

47
New cards

router(config)# aaa new-model

router(config)# username Mike password Password

router(config)# tacacs-server SecureLoginTACACS+

router(config-radius-server)#address ipv4 10.10.10.254

router(config-radius-server)#key MyTACACS+PW

router(config)#aaa authentication login default group MyTACACS+Group local

Config TACACS+ server named SecureLoginTACACS+ with an address of 10.10.10.254 and a key of TACACS+PW. Set it up that if the TACACS+ server fails the fallback is local authentication.

48
New cards

A text document that ties a user account to a public and private key pair created by a certificate server or certificate authority.

It provides an entity with the credentials to proves its identity and associates that identity with a public key. At a minimum a digital ______ must provide the serial number, the issuer, the subject (owner) and the public key.

Certificate

49
New cards

by something they know PW

by something they are (retina, fingerprint facial recognition)

by something they possess (smart card)

by somewhere they are (location)

by something they do (behavior)

How can user be identified

50
New cards

_____ uses unique biological and behavioral traits to identify and authenticate individuals, offering a more secure and convenient alternative to traditional methods like passwords or PINs

biometric

51
New cards

Public Key Infrastructure is a system that links users to public keys and verifies a users identity by using a CA (Certificate Authority). _______ encryption operates through asymmetric cryptography, meaning that a different key is used to encrypt and decrypt the message, respectively.

PKI

52
New cards

an organization responsible for validating user IDs and issuing unique identifiers (certificates) to confirm the individuals to certify that their identity can really be trusted

Certificate Authority

CA

53
New cards

a security system created by MIT that establishes a users identity when they first log on to a system. It employs a strong encryption for all transactions and communications, and it is readily available. _____ uses tickets that expire quickly but automatically refresh as log as the user is logged in. With a ______ all users must have a synchronized clock. The Secret keys are stored in an encrypted state.

Kerberos

54
New cards

only enable ssh to vty


rtr(config)#vty 0 4

rtr(config-line)# transport input ssh

this disables telnet and enables only ssh

55
New cards

also called highjacking takes advantage of TCP when a user believes they are sending packet to a valid host when they are actually sending them to a highjacker.

session hijacking/ replaying can be defended with by using strong authentication and encrypted management protocols.

Session replay

56
New cards

strong, complex passwords that expire, screen saver passwords and BIOS passwords

A good organizational password policy would include…

57
New cards

A Port Security

C Dynamic ARP Inspection

which of the following will mitigate access layer threats?

A Port Security

B Access Lists

C Dynamic ARP Inspection

D AAA

58
New cards

B DHCP Snooping is required in order to build the MAC to IP binding for DAI validation

What is true of DAI (Dynamic ARP Inspection)

A It must use TCP, BootP and DHCP snooping in order to work

B DHCP Snooping is required in order to build the MAC to IP binding for DAI validation

C DAI is required in order to build the MAC to IP which protects against man in the middle attacks

D DAI tracks ICMP to MAC binding from DHCP

59
New cards

Client

Authenticator

Authentication Server

What are the 3 roles for 802.1x standard ?

60
New cards

C Session Replay

E SNMP

F SMTP

Which of the following are examples ofa TCP/IP weakness? choose 3

A Trojan Horse

B HTML attack

C Session Replay

D Application layer attack

E SNMP

F SMTP

61
New cards

B TCP Intercept

which Cisco IOS feature would you use to protect TCP server from TCP SYN-flooding attacks?

A Rerouting

B TCP Intercept

C Access Control List

D Encryption

62
New cards

B E G

with Cisco Lock and Key along with CHAP and TACACS+ you can create a more secure network and hel stop unauthorized access

Which of the following can be used to counter unauthorized access attempts (choose 3)

A Encryption data

B Cisco Lock and Key

C Access List

D PAP

E CHAP

F IKE

G TACACS+

63
New cards

Proxy ARP

Proxy ARP is a networking technique where a router or switch responds to Address Resolution Protocol (ARP) requests on behalf of other devices, essentially acting as a proxy for resolving IP addresses to MAC addresses

64
New cards

A category of protocols that provides redundancy for the default gateway, ensuring that hosts always have an available gateway even if the primary router fails

First Hope Redundancy Protocol works by giving you a way to config more then 1 physical router to appear as if they were only a single logical one.

FHRP

65
New cards

Fault tolerant solutions ensure continues operation in the event of a device failure, and load balancing solutions distribute the workload over multiple devices.

Fault tolerant solutions ensure continues operation in the event of a device failure, and load balancing solutions distribute the workload over multiple devices.

66
New cards

HSRP

Cisco propriety protocol that provides a redundant gateway for hosts on a local subnet.

HSRP allows you to config 2 or more routers into a standby group that shares an IP and MAC address and provides a default gateway. When the IP and MAC are independent from the routers physicl address (on a virtual interface) they can swap control of an address if the current active router fails.

67
New cards

Active router

Standby router

Virtual router

Other routers

HSRP standby groups contain which routers?

68
New cards

What are the HSRP timers?

hello timer - default is 3 seconds and they ID the state of each router

hold timer - specifies the interval the standby router uses to determine whether the active router is offline or out of commo. default is 10 sec

active timer - monitors the state of the active router and resets when ever the standby group receives a Hello from active router. Timer is based off hold timer

standby timer - monitors the state of the standby rtr and resets when ever a rtr in the standby group receives a hello from the stanby router. timer is based off the hold timer.

69
New cards

The physical router that receives data sent to the virtual router. The active router processes the data that’s being fwded and will also answer any ARP requests destined for the virtual router.

Active Router

70
New cards

Standby routers

backup to the active router. It monitors the active router and quickly takes over if active router fails or loses commo

71
New cards

In HSRP it is nothing more then IP and MAC that packets are sent to. It is not a physical entity.

Virtual Router

72
New cards

Any router that is not active or standby that is in the HSRP standby group. Can be up to 255 per group. They monitor Hello msgs to ensure the active/standby router exists. They will fwd data that is specifically addressed to their IP. These routers send “speak” msg based on the Hello timer interval that informs other routers of their position in an election

Other Routers

73
New cards

The default priority is 100 for a router with HSRP interface tracking enabled. If a tracked interface goes down then the priority value goes down making that router less desirable in an election.

What is the default priority of a router with HSRP interface. What happens to the priority of a tracked interface goes down.

74
New cards

standby group# ip virtual_ip

the group # and virtual ip will be the same on both routers configed for HSRP

What’s the simple command to config HSRP?

75
New cards

What command will force an HSRP election in group 1?

rtr(config-if)#standby 1 preempt

76
New cards

show standby

show standby brief

How do you verify HSRP?

77
New cards

Things to look for when troubleshooting HSRP..

different HSRP virtuap IPs config on peers

different HSRP group are configed on the peers

different HSRP version are configed on the peers or ports are blocked

78
New cards

HSRP and GLBP (Gateway Load Balancing Protocol) are Cisco Propriety.

VRRP (Virtual Router Redundancy Protocol) is not

What are the different FHRPs and which are Cisco propriety?

79
New cards

The first 24 bits identify the vendor who manufactured the device (OUI). the next 16 bits tells us that the MAC address is a well-known HSRP MAC address. The last 8 bits of the address are a hexadecimal representation of the HSRP group number.

0000.0c07.ac0a

Describe HSRP virtual MAC.

80
New cards

What are the different HSRP states?

INIT

Learn

Listen

Speak

Standby

Active

81
New cards

INIT

A HSRP state where HSRP is not running.

82
New cards

Learn

A HSRP state where Router has not determined the virtual IP and has not seen an authenticated hello message. The router waits to hear from the Active router.

83
New cards

Listen

A HSRP state where Router knows the Virtual IP, but the router is not the active or standby router.

84
New cards

Standby

A HSRP state where Router is a candidate to be the next Active router. Sends periodic Hello messages.

85
New cards

Speak

A HSRP state where a Router sends periodic hello msg and actively participates in the election of the active/standby routers. A router cannot enter the Speak state unless the router has the virtual IP.

86
New cards

Active

A HSRP state where a router currently forwards packets that are send to the group virtual MAC address. The router sends periodic hello msgs.

87
New cards

In HSRP ver 1 HSRP msgs are sent to multicast address 224.0.0.2 with UDP port 1985. In HSRP ver2 the HSRP messages are sent to multicast address 224.0.0.102 and port UDP 1985.

These IP addresses and ports need to be permitted in the inbound access list. If the packets are blocked, the peers wont see each other and there will be no HSRP redundancy.

In HSRP ver 1 HSRP msgs are sent to multicast address 224.0.0.2 with UDP port 1985. In HSRP ver2 the HSRP messages are sent to multicast address 224.0.0.102 and port UDP 1985.

These IP addresses and ports need to be permitted in the inbound access list. If the packets are blocked, the peers wont see each other and there will be no HSRP redundancy.

88
New cards

Which of the following are HSPR state(choose 2)?

A INIT

B Active

C Established

D Idle

A INIT

B Active

89
New cards

Which of the following statements is true about HSRP ver 1 hello packets?

A HSRP hello packets are sent to multicast address 224.0.0.5

B HSRP hello packets are sent to multicast address 224.0.0.2 with TCP port 1985

C HSRP hello packets are sent to multicast address 224.0.0.2 with UDP port 1985

D HSRP hello packets are sent to multicast address 224.0.0.10 with TCP port 1986

C HSRP hello packets are sent to multicast address 224.0.0.2 with UDP port 1985

90
New cards

What’s the multicast and port number for HSRP ver 2?

224.0.0.2 UDP port 1985