Term
|
Definition
| Something were going to protect |
|
|
Term
|
Definition
| a spot of weakness in the network |
|
|
Term
|
Definition
| somthing out to get the network |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Cisco security framework that keeps security policies up to date and enforced |
|
|
Term
|
Definition
| Users & roles are employed to describe / defend threats |
|
|
Term
| Example of context aware security |
|
Definition
| I can only access the asa when on local lan |
|
|
Term
|
Definition
| Application security appliance |
|
|
Term
|
Definition
| Intrusion prevention system |
|
|
Term
| What exists on the management plane |
|
Definition
| Hardware and traffic needed to administer the devices on the network |
|
|
Term
| Example of management traffic |
|
Definition
| SSH / HTTPS/ SNMP / Netflow |
|
|
Term
|
Definition
| Logic systems that make route / switch decisions |
|
|
Term
| Example of control plane traffic |
|
Definition
| Secured routing protocols (i.e. encrypted ospf updates) |
|
|
Term
|
Definition
| Our ability to forward general data |
|
|
Term
|
Definition
| End user accessing FTP or sharepoint server |
|
|
Term
|
Definition
|
|
Term
|
Definition
| The concept of securing the Management / Control / Data planes |
|
|
Term
|
Definition
| Unicast reverse path forwarding |
|
|
Term
|
Definition
| Checks entry point of packet against route table. Ensures ingress request matches egress request |
|
|
Term
|
Definition
| Spoofed ip source addresses traversing the network |
|
|
Term
|
Definition
| Authentication, authorization, accounting |
|
|
Term
| What is a AAA method list |
|
Definition
| What database each individual A will use |
|
|
Term
| What's an example of a AAA method list |
|
Definition
|
|
Term
| What are the default privilege levels |
|
Definition
| 0 & 15 are defaults, 1-14 are for customization |
|
|
Term
|
Definition
| Assigning custom / restricted commands to a privilege level |
|
|
Term
|
Definition
| Send data about router / switch health to syslog server |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Prevents erasing / tampering of ios files via secure ftp |
|
|
Term
| What is inter-vlan routing |
|
Definition
| Moving data between vlans |
|
|
Term
| 2 examples of a inter-vlan |
|
Definition
| Router on a stick (RoS) / virtual RoS |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Preventing storms / packet loops |
|
|
Term
|
Definition
| Ensure only 1 path is used in moving data around |
|
|
Term
| How is the root port selected |
|
Definition
| Lowest number between two trunk switch ports |
|
|
Term
| How do root guard enabled trunks communicate |
|
Definition
|
|
Term
| What is an extended ACL # |
|
Definition
|
|
Term
| Define ACE (in the context of ACL's) |
|
Definition
| ACE - Access control entity |
|
|
Term
|
Definition
| Collection of ACL lines and code |
|
|
Term
|
Definition
|
|
Term
| What is a syn-flood attack |
|
Definition
| A massive amount of syn requests w/o the ack response sent from attacking server |
|
|
Term
| Syn-flood attack involves what protocol? |
|
Definition
|
|
Term
| What is the standard ACL #'s in ios |
|
Definition
|
|
Term
| (CCP-GUI) how do I access the ACL editor? |
|
Definition
| Config -> router - > acl - > acl editor |
|
|