click below
click below
Normal Size Small Size show me how
640-554
CCNA Security 640-554 Exam
| Question | Answer |
|---|---|
| Node-local multicast | FF01::/16 |
| link-local multicast | FF02::/16 |
| site-local multicast | FF05::/16 |
| organization-local multicast | FF08::/16 |
| global multicast | FF0E::/16 |
| reserved multicast | FF0F::/16 |
| solicited-node multicast | FF02::1:FF00/104 |
| Describe PVLAN Edge | Locally significant No isolation between switches Protected port does not forward any traffic to another protected port on the same switch |
| Multiple Context Mode | can be viewed as having multiple separate (virtual) firewalls on the same hardware. Each context is its own security entity with its own security policy and interfaces. |
| Privilege Level 0 | Allows the user to issue the disable, enable, exit, help, and logout commands. |
| Privilege level 1 | Any commands at the > prompt |
| Privilege level 15 | Any command at the # prompt |
| SFR | Signature Fidelity Rating: Indicates how accurate a signature is. |
| ASR | Attack Severity Rating: Indicates how dangerous an attack is |
| TVR | Target Value Rating: Indicates the relative value of an asset |
| RR | Risk Rating: Indicates the risk that an attack presents to a target |
| ARR | Attack Relevancy Rating: Indicates whether a target is vulnerable to an attack |
| With ZBF when is traffic dropped by default? | Traffic sent from an interface that is not a member of a zone to an interface that is a member of a zone Traffic sent between interfaces that are members of different zones. |
| Dynamic PAT vs Dynamic Policy PAT | Dynamic Policy PAT requires an ACL |
| Dynamic PAT | Also called NAT Overload. Dynamically maps several private IPs to a single public IP address using ports. |
| Dynamic Policy PAT | |
| Dynamic NAT | Dynamically maps several private IPs to a pool of public IPs |
| Dynamic Policy NAT | |
| static NAT | Single private IP is mapped to a single public IP. |
| static PAT | Single private and port is mapped to a single public IP and port. |
| retired signatures | Not in memory |
| unretired signature | In memory |
| enabled signature | In memory |
| disabled signature | In memory |
| Object Group | A configured set of IP addresses, IP address ranges, networks, protocols, or services. Can only be used with Extended ACLs. |
| Logging levels: 0,1,2,3,4,5,6,7 | emergency,alert,critical,error,warning,notifcations,informational,debugging |
| NME IPS | Network Module Enhanced IPS for ISRs |
| AIM IPS | Advanced Integration Module IPS for ISRs |
| AIP SSC | Advanced Inspection and Protection Security Services Card for ASA |
| IPS 4240 | |
| ISDM-2 | Intrusion Detection System Module for Catalyst 6500 switch |
| AIP SSM | Advanced Inspection and Prevention Security Services Module for ASA |
| IOS IPS | For ISRs |
| Aggressive Mode | 3 packets to negotiate VPN |
| Main Mode | 6 packets to negotiate VPN |
| NIPS | Network-based IPS: Cannot analyze encrypted traffic. |
| Describe PVLAN | A switch must be configured for VTP transparent mode Routers, firewalls, and gateways should be connected to promiscuous ports Include a primary vlan and one or more secondary VLANs. Primary VLAN cannot be configured as isolated or community. |
| ACL Syntax | |
| Phishing | |
| Pharming | |
| Signature-based detection | |
| anomaly-based detection | |
| policy-based detection | |
| reputation-based detection | |
| Stateful filtering operates at what levels of the OSI model? | 3,4,5 |
| Static filtering operates at what levels of the OSI model? | |
| Inside NAT | If the host resides inside the network and their addresses are translated for outbound traffic flows. |
| Outside NAT | If the host resides on the outside network and its address is translated for inbound traffic flows. |
| What is used to apply actions to network traffic? | Policy Maps |
| Atomic signature engine | Signatures that can match on a single packet, as compared to a string of packets |
| Service signature engine | Signatures that examine application layer services, regardless of the operating system |
| String signature engine | Supports flexible pattern matching, and can be identified in a single packet or group of packets, such as a session. |
| Other signature engine | Miscellaneous signatures that may not specifically fit into other categories. |
| Another name for Proxy Firewall | Application firewall |
| IronPort | Email and web security |
| ScanSafe | Cloud Web Security |
| IPv6 Global Unicast | 2000::/3 |
| IPv6 6to4 Unicast | 2002::/16 |
| IPv6 site-local unicast | FC00::/7 |
| IPv6 link-local unicast | FE80:/10 |
| access-class | Assigned to VTY lines |
| access-group | Assigned to an interface |
| How can you implement an IPS in an ISR? | AIM-IPS, NME-IPS, IOS IPS |
| Symmetric Algorithms (examples) | One key to both encrypt and decrypt. |
| Asymmetric Algorithms (examples) | Public-private key pair to encrypt & decrypt. |
| secure boot-image | Enables IOS image resilience. Hidden from directory listing. |
| secure boot-config | |
| Static Packet-Filtering Firewall | L3, L4. |
| Stateful Packet-Filtering Firewall | L3,L4,L5 |
| Proxy Firewall | Also called Application Firewall. L3-L7. |
| Attack methods | Reconnaissance, Social Engineering, Privilege escalation, back doors. |
| Secure Network Lifecycle | Initiation Acquisition & Development Implementation Operations & Maintenance Disposition |
| AUP | Acceptable use policy |
| Management Plane | This includes the protocols and traffic that an administrator uses between his workstation and the router or switch itself. SSH, telnet, HTTPS, etc. |
| Control Plane | This includes protocols and traffic that the network devices use on their own without direct interaction from an administrator. Routing protocols. CPU being used. |
| Data Plane | Traffic that is being forwarded through the network (transit traffic). Traffic that is being switched or forwarded by the network devices between the client and server. |
| Steps to setup device for CCP | ip server ip http secure-server ip http authentication local username _____ privilege 15 secret ______ |
| Connection profiles | Pre-login configuration |
| Group Policy | Post-login configuration |
| L2 Security | Port security, BPDU guard, Root guard, DAI, IP source guard, 802.1x, Storm Control, ACLs, DHCP snooping |
| Threats to IPv6 | NDP, DHCPv6, Extension Headers, Autoconfig of IPv6 addresses. |
| ZBF | Zone-based firewall. |
| What can ACLs protect against? | IP address spoofing TCP SYN-flood attacks (DoS) Reconnaissance attacks General vulnerabilities |
| What implicit rule is near the end of an IPv6 ACL? | Implicit allow for NS and NA |
| Inside local | The real IP configured on an inside host such as PC1 |
| Inside global | The mapped/global address that the router is swapping out for the inside host during NAT |
| Outside local | If performing NAT on outside devices, this is the mapped address of the outside device (such as a server) as it would appear to inside hosts |
| Outside global | The real IP configured on an outside host, such as the IP on a server. |
| Shadowed rule (acl) | |
| Orphaned rule (acl) | |
| What is used to identify traffic? | Class Maps |
| What is used to apply policies? | Service policies |
| When is a zone policy applied in a ZBF? | Between members of different zones with a zone pair existing between them. |
| When is traffic dropped in a ZBF? | Between members of different zones with no zone pair between them. Between an interface that is not a member of any zone goinging to an interface that is a member of a zone. |
| When is traffic forwarded in a ZBF? | Between two interfaces where each interface is not a member of any zone. Between two interfaces that are members of the same zone. Traffic flowing to and from the router interfaces (self zone) |
| What is normalization? (IPS/IDS) | Normalization is the process of modifying or manipulating traffic inline based on a current set of rules. Only applies to IPS. |
| False Positive | When the sensor thinks good traffic is bad. |
| False Negative | When the sensor thinks bad traffic is good. |
| Reputation-based IPS (example of threat that is protects against) | Uses a global online database to learn about threats that are happening in the world and uses the information to protect against them. |
| NTP master | |
| NTP client | |
| AH port | Authentication Header - Port 51 |
| IPsec ESP port | Encapsulating Security Protocol - Port 50 |
| IKE/ISAKMP port | 500 |
| IKE Phase 1 Modes/Steps | Main/aggressive mode Authenticates peer using PSK or digital certificate Uses DH during the second message exchanges Negotiates the IKE policy |
| IKE Phase 2 Modes/Steps | Establishes the IPsec SAs Can optionally perform additional DH exchanges Quick mode negotiates the IPsec security parameters |
| TACACS+ Port Numbers | TCP 49 |
| RADIUS Port Numbers | 1812/1645 Authentication 1813/1646 Accounting |
| How do you enable anyconnect via CLI? | anyconnect enable |
| How do you make MD5 password more secure? | Salt |
| What is used to negotiate the SA? | IKE |
| Another name for reconnaissance attack | Footprint analysis |
| Advantages of Application Layer Firewall | Authenticate individuals, not devices Make it harder for hackers to spoof and implement denial-of-service (DoS) attacks Can monitor and filter application data Can provide detailed logging |
| What is vishing? | Voice phishing - Convincing people to provide personal information over the phone. |
| What is a blended threat? | An exploit that combines elements of multiple types of malware |