Term
What are application layer attacks? |
|
Definition
FTP, HTTP. Look for holes within software. |
|
|
Term
|
Definition
Running scans on a computer that can give vital information regarding the network |
|
|
Term
|
Definition
Denial of Service/Distributed Denail of Service:Flooding the networks resources...making it unaviable |
|
|
Term
|
Definition
PC Sends of a SYN Connection and gets a ACK response back. Victim Machine is then flooded with SYN ACK Packets and goes down. |
|
|
Term
|
Definition
Send repetitive max size of pings to a machine. Max ping size is 65,536. |
|
|
Term
|
Definition
Attacker uses an Address within network scope or a trusted outside address to penitrate the system |
|
|
Term
What are Man In the Middle Attacks? |
|
Definition
Steals data intented for a trusted endpoint |
|
|
Term
What is Network Reconnaissance? |
|
Definition
Gather information about the network through port scans, dns queries and ping sweeps. |
|
|
Term
What are the features of a CISCO Firewall? |
|
Definition
Firewall inspection engine Intrusion Detection Firewall voice traversal ICMP Inspection Authentication Proxy Destination URL management Per User Firewalls Dynamic Port Mapping |
|
|
Term
How many Access Lists can be applied on one interface? |
|
Definition
One Access list per interface per protocol per direction. Max of two. One for outbound one for inbound. |
|
|
Term
Where should more specific lists be located? |
|
Definition
Top of the access list chain |
|
|
Term
Where are new access lists placed when they are added? |
|
Definition
At the bottom of the Access list chain. |
|
|
Term
What is required at the end of a list to prevent all traffic from being dropped? |
|
Definition
|
|
Term
What traffic can an access list not filter in regards to a router? |
|
Definition
Information originated from the router |
|
|
Term
Where should standard access lists be placed? |
|
Definition
Close to the destination. |
|
|
Term
Where should extended access lists be placed? |
|
Definition
|
|
Term
What are the 4 rules to use when configuring ACL's for the internet |
|
Definition
Deny address from internal network Deny local host address (127.0.0.0/8) Deny reserved private addresses Deny any IP Address int he IP Multicast range(224.0.0.0/4) |
|
|
Term
Do Standard ACL's filter by destination or source |
|
Definition
|
|
Term
What is the command to deny a host access to telnet access to a router |
|
Definition
router(config)#access-list 50 permit 172.16.10.3 router(config)#line vty 0 4 router(config-line)#access-class 50 in |
|
|
Term
What does the eq stand for when configuring an extended access list |
|
Definition
|
|
Term
What is the command to create a named ACL? |
|
Definition
ip access-list standard ThisThat |
|
|
Term
What is a switch port ACL? |
|
Definition
An ACL that can be applied to layer two switches. They use Source and Destination MAC Addresses to filter packets |
|
|
Term
What is the command to create a named layer two ALC and deny any host to a MAC Address. |
|
Definition
switch(config)#mac access-list extended thisthat switch(config-ext-macl)#deny any host xxxx.xxxx.xxxx switch(config-ext-macl)#permit any any switch(config)#int fa0/6 switch(config-if)#mac address-group thisthat |
|
|
Term
What is a time based ACL? |
|
Definition
An ACL that is configured to used during a certain time period. |
|
|
Term
What is a remark as in conjunction with ACL's |
|
Definition
They can be used to describe the ACL. |
|
|
Term
What is an example of a configured acl with a remark |
|
Definition
router(config)#remark Deny all of Sales from Telnetting |
|
|
Term
|
Definition
Control Based Access Control:It inspects all traffic entering through a firewall. |
|
|
Term
What are IP Inspect lists? |
|
Definition
Works in conjuntion with CBAC and allows return traffic to enter through the firewall. |
|
|
Term
What does the show access-list command show? |
|
Definition
It shows all access lists configured on the router. |
|
|
Term
What does the command show access-list 110 command show? |
|
Definition
Shows only the paramters of ACL 110. It does not show the interface it is attached to. |
|
|
Term
What does the show ip access-list show? |
|
Definition
Shows all the IP Access-lists configured on the router |
|
|
Term
Which command will show which interfaces ACL's are configured on |
|
Definition
|
|
Term
What is the command to create an access list that will allow only HTTP traffic into network 196.15.7.0? |
|
Definition
access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www |
|
|
Term
What is the command to create an ACL that will deny all telnet connections yo only network 192.168.10.0 |
|
Definition
access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 |
|
|
Term
What is the command to deny FTP traffic from 200.200.10.0 to 200.199.11.0 but allow everything else. |
|
Definition
access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp |
|
|