• Aucun résultat trouvé

Answers to Securing Cisco IOS Networks Assessment Test 1

Dans le document Complete Study Guide (Page 60-63)

1. A, B, D. The debug commands debug aaa authentication, debug aaa authorization, and debug aaa accounting can be used to help you trace AAA packets and monitor the AAA activities on the NAS. See Chapter 2 for more information.

2. C. IPSec encrypts all headers (including the data payload) after the Network layer header. See Chapter 7 for more information.

3. C. Unsecured user accounts are considered a weakness in configuration. See Chapter 1 for more information.

4. B. TCP Intercept can protect against DoS SYN flood attacks. See Chapter 4 for more information.

5. A. Pre-shared keys and RSA digital signatures are supported authentication types. DSS is not supported. DES and 3DES are encryption algorithms, not authentication types. See Chapter 9 for more information.

6. D. The ip inspect one-minute high 100 command sets the maximum number of half-open TCP connections per minute to 100. See Chapter 5 for more information.

7. B. TCP/IP has some inherent weaknesses. IP spoofing, man-in-the-middle attacks, and session replaying are some examples of attacks that take advantage of TCP/IP weaknesses. See Chapter 1 for more information.

8. A. The default action for attack signatures is to alert. See Chapter 6 for more information.

9. C. Token cards/soft tokens are the most secure method of user authentication. See Chapter 2 for more information.

10. A, B, D. Policy, technology, and configuration weaknesses are the three typical weaknesses in any network implementation. See Chapter 1 for more information.

11. A. The first step in using RSA-encrypted nonces requires the user to manually generate the keys. The user must then manually enter the public key created on each device into the device they wish to peer with. See Chapter 7 for more information.

12. C. To reset all active IKE SAs on a device, use the * keyword with the clear crypto isakmp command. If you just want to reset a particular IKE SA, use the clear crypto isakmp conn-id command. See Chapter 8 for more information.

13. C. Authentication identifies a user, including login, password, messaging, and encryption. See Chapter 2 for more information.

14. B. The ip inspect tcp idle-time 600 command sets the idle time on TCP connections to 10 minutes (600 seconds). See Chapter 5 for more information.

Answers to Securing Cisco IOS Networks Assessment Test 1 lxi

15. D, E. Cisco describes the absence of a disaster recovery plan and a high turnover rate in the technical support department as policy weaknesses. See Chapter 1 for more information.

16. A. ESP provides for data confidentiality (encryption). AH does not provide encryption. See Chapter 7 for more information.

17. A, D, E. You can populate the Cisco Secure User Database in only three ways: manually, using the Database Replication utility, or using the Database Import utility. CSNT can authenticate to external user databases such as Novell NDS or Windows NT, but it does not import these data-bases. See Chapter 3 for more information.

18. D. To start AAA on an NAS, use the global configuration command aaa model. The new-model keyword reflects changes from the initial implementation, which is no longer supported.

See Chapter 2 for more information.

19. C. CBAC defines a half-open connection as any connection that fails to reach an established state. See Chapter 5 for more information.

20. C, E. CSNT supports TACACS+ and RADIUS communication with the NAS. See Chapter 3 for more information.

21. C, E, F. There are many problems with the IP stack, especially in Microsoft products. Session replaying is a weakness that is found in TCP. Both SNMP and SMTP are identified by Cisco as inherently insecure protocols in the TCP/IP stack. See Chapter 1 for more information.

22. D. IPSec and encryption are used to prevent eavesdropping. See Chapter 4 for more information.

23. B. MD5 authentication can be used to secure against rerouting attacks. See Chapter 4 for more information.

24. D. The CSNT web server listens on TCP port 2002. See Chapter 3 for more information.

25. B, D, A, F, E, C. The six steps to configure CBACs are as follows: set audit trails and alerts, set global timeouts and thresholds, define Port-to-Application Mapping, define inspection rules, apply inspection rules and ACLs to interfaces, and finally, test and verify CBAC. See Chapter 5 for more information.

26. D. ISAKMP uses UDP port 500 for communications. See Chapter 7 for more information.

27. B. Policy, technology, and configuration weaknesses are the three typical weaknesses in any network implementation. See Chapter 1 for more information.

28. B. The TCP Intercept feature implements software to protect TCP servers from TCP SYN flood attacks, which are a type of denial-of-service attack. See Chapter 4 for more information.

29. C, E. The Cisco IOS Cryptosystem consists of DES, MD5, DSS, and DH. See Chapter 7 for more information.

30. E. The ip inspect tcp max-incomplete host 100 command sets the maximum number of half-open TCP connections to a single host to 100. See Chapter 5 for more information.

lxii Answers to Securing Cisco IOS Networks Assessment Test 1

31. A. During IKE phase 1, DH is used to create the private keys, Xa and Xb, and the public keys, Ya and Yb. DH then uses these keys to create the shared secret key ZZ, which is used to encrypt the DES and MD5 keys. So, answer A is correct. See Chapter 7 for more information.

32. B, C, D. The authentication methods supported by Cisco Secure 3.0 include Windows NT/2000, Novell Directory Services (NDS), Directory Services (DS), Token Server, ACS Databases, Microsoft Commercial Internet System Lightweight Directory Access Protocol (MCIS LDAP), and Open Database Connectivity (ODBC). See Chapter 3 for more information.

33. C. The ip inspect max-incomplete high 1000 command sets the maximum number (regard-less of the destination host) of half-open TCP connections to a single host to 1000. See Chapter 5 for more information.

34. B, C. CS ACS supports token-card servers from CryptoCard, ActivCard, Vasco, RSA ACE/

Server, Secure Computing SafeWord, and AXENT Defender. See Chapter 3 for more information.

35. C. You must have at least 12.2(8)T to run the IOS Easy VPN Server. See Chapter 9 for more information.

36. B. Both memory usage and signature coverage are issues to consider when planning an IOS Firewall IDS implementation. Performance impact is a third issue to consider. See Chapter 6 for more information.

37. B, E. This command specifies to use the default list against the TACACS+ server and that TACACS+ is the default login method for all authentications. The none keyword at the end means that if the TACACS+ process is unavailable, no login is required. See Chapter 3 for more information.

38. C, F. DH groups 2 and 5 are supported by Cisco Easy VPN Server. DSS, DH1, PFS, and manual keys are not supported. See Chapter 9 for more information.

39. A. Atomic signatures trigger on a single packet. See Chapter 6 for more information.

40. C, D. The text after AAA/AUTHEN means that this is from the authentication component of AAA. Method=LOCAL means that the local line will be used for authentication. See Chapter 2 for more information.

Cisco Secure PIX Firewall Advanced

Dans le document Complete Study Guide (Page 60-63)