Memory Tables Answer Key: Appendix D
Memory Tables Answer Key: Appendix D
Chapter 3
Table 3-2 TACACS+ Versus RADIUS
TACACS+ RADIUS
Functionality Separates AAA functions into Combines many of the
distinct elements. Authentication functions of authentication
is separate from authorization, and authorization together. Has
and both of those are separate detailed accounting capability
from accounting. when accounting is configured
for use.
Standard Cisco proprietary, but very well Open standard, and supported
known. by nearly all vendors AAA
implementation.
L4 protocol TCP. UDP.
Confidentiality All packets are encrypted Only the password is encrypted
between the ACS server and the with regard to packets sent back
router (which is the client). and forth between the ACS
server and the router.
Granular command by This is supported, and the rules No explicit command
command authorization are defined on the ACS server authorization checking rules
about which commands are can be implemented.
allowed or disallowed.
Accounting Provides accounting support. Provide accounting support,
and generally acknowledged
as providing more detailed or
extensive accounting capability
than TACACS+.
Chapter 5
Table 5-2 VPN Components
Component Function Examples of Use
Symmetrical Use the same key for encrypting and decrypting DES, 3DES, AES,
encryption data. IDEA
algorithms
Asymmetrical Uses a public and private key. One key encrypts RSA, Diffie-Hellman
encryption the data, and the other key in the pair is used to
decrypt.
Digital signature Encryption of hash using private key, and RSA signatures
decryption of hash with the senders public key.
Diffie-Hellman key Uses a public-private key pair asymmetrical Used as one of the
exchange algorithm, but creates final shared secrets (keys) many services of
that are then used by symmetrical algorithms. IPsec
Confidentiality Encryption algorithms provide this by turning DES, 3DES, AES,
clear text into cipher text. RSA, IDEA
Data integrity Validates data by comparing hash values. MD5, SHA-1
Authentication Verifies the peers identity to the other peer. PSKs, RSA signatures
Chapter 6
Table 6-2 IPsec Goals and the Methods Used to Implement Them
Goal Method That Provides the Feature
Confidentiality Encryption
Data integrity Hashing
Peer authentication Pre-shared keys, RSA digital signatures
Antireplay Integrated into IPsec, basically applying serial numbers to packets
Chapter 7
Table 7-3 IKEv1 Phase 1 Policy Options
Function Strong Method Stronger Method
Hashing MD5, 128-bit SHA1, 160-bit
Authentication Pre-shared Key (PSK) RSA-Sigs (digital signatures)
Group # for DH 1,2,5 IKE Groups 14 and 24 use 2048-bit
key exchange DH. Groups 15 and 16 use 3072-bit
and 4096-bit DH. Groups 19 and 20
support the 256-bit and 384-bit ECDH
groups, respectively.
Lifetime 86400 seconds (1 day, default) Shorter than 1 day, 3600
Encryption 3DES AES-128 (or 192, or 256)
Chapter 8
Table 8-3 Comparison Between SSL and TLS
SSL TLS
Developed by Netscape in the 1990s Standard developed by the Internet Engineering
Task Force (IETF)
Starts with a secured channel and Can start with unsecured communications and
continues directly to security negations dynamically switch to a secured channel based on
on a dedicated port the negotiation with the other side
Widely supported on client-side Supported and implemented more on servers,
applications compared to end-user devices
More weaknesses identified Stronger implementation because of the standards
process
Appendix D: Memory Tables Answer Key 9
D
10 CCNA Security 210-260 Official Cert Guide
Chapter 9
Table 9-2 Toolkit for Layer 2 Security
Tool Description
Port security Limits the number of MAC addresses to be learned on an access switch
port, as covered later in this chapter.
BPDU Guard If BPDUs show up where they should not, the switch protects itself, as
covered in this chapter.
Root Guard Controls which ports are not allowed to become root ports to remote
root switches, as covered in this chapter.
Dynamic ARP Prevents spoofing of Layer 2 information by hosts.
inspection
IP Source Guard Prevents spoofing of Layer 3 information by hosts.
802.1X Authenticates users before allowing their data frames into the network.
DHCP snooping Prevents rogue DHCP servers from impacting the network.
Storm control Limits the amount of broadcast or multicast traffic flowing through the
switch.
Access control lists Traffic control to enforce policy. Access control is covered in another
chapter.
Chapter 10
Table 10-2 Components of a Threat Control and Mitigation Strategy
Plane Security Measures Protection Objectives
Management Authentication, authorization, Authenticate and authorize any
plane accounting (AAA) administrators. Protect time
synchronization by using authenticated
Authenticated Network Time
NTP. Use only encrypted remote-access
Protocol (NTP)
protocols such as SSH for CLI and SSL/TLS
Secure Shell (SSH) for GUI tools, and use secure versions of
SNMP. If plaintext tools are used (such as
Secure Sockets Layer/Transport syslog or Telnet), they should be protected
Layer Security (SSL/TLS) by encryption protocols such as IPsec or
Protected syslog should be used out of band (a separate
network just for management traffic).
Simple Network Management A parser view is a way to limit what a
Protocol Version 3 (SNMPv3) specific individual, based on his role, can
Parser views do on the router.
Appendix D: Memory Tables Answer Key 11
Feature Explanation
IOS IPS IOS IPS is a software implementation of an intrusion prevention system (IPS)
that is overlaid on top of the existing routing platform, to provide additional
security. IOS IPS uses signature matches to look for malicious traffic. When
an alert goes off because of a signature match, the router can prevent the
packet from being forwarded, thus preventing the attack from reaching the final
destination.
TCP This tool enables the router to look at the number of half-formed sessions that
Intercept are in place and intervene on behalf of the destination device. This can protect
against a destination device from a SYN-flood attack that is occurring on your
network. The zone-based firewall on an IOS router includes this feature.
Unicast Unicast Reverse Path Forwarding (uRPF) can mitigate spoofed IP packets.
Reverse Path When this feature is enabled on an interface, as packets enter that interface the
Forwarding router spends an extra moment considering the source address of the packet. It
then considers its own routing table, and if the routing table does not agree that
the interface that just received this packet is also the best egress interface to use
for forwarding to the source address of the packet, it then denies the packet.
This is a good way to limit IP spoofing.
Chapter 11
Table 11-2 AAA Components to Secure Administrative and Remote LAN Access
Access Type Mode Mode Where These Are AAA Command
Likely to Be Used Element
Remote administrative Character (line or Lines: vty, AUX login, enable,
access EXEC mode) console, and tty exec
Usually TACACS+ between
the router and the ACS
Remote network access end Packet (interface Interfaces: async, ppp, network,
users mode) such as group-async, BRI, PRI vpn groups
an interface with
Usually RADIUS between Other functionality:
PPP requiring
the router and the ACS VPN user
authentication
authentication
Chapter 12
Table 12-3 Conversion Charts Between Decimal, Binary, and Hexadecimal
Decimal Binary Hexadecimal
0 0000 0
1 0001 1
2 0010 2
3 0011 3
14 CCNA Security 210-260 Official Cert Guide
Chapter 14
Table 14-5 Advantages and Disadvantages of Application Layer Gateways
Advantages Disadvantages
Very tight control is possible, due to Is processor intensive because most of the work is
analyzing the traffic all the way to the done via software on the proxy server.
application layer.
It is more difficult to implement an Not all applications are supported, and in practice
attack against an end device because of it might support a specific few applications.
the proxy server standing between the
attacker and potential victim.
Can provide very detailed logging. Special client software may be required.
May be implemented on common Memory and disk intensive at the proxy server.
hardware.
Could potentially be a single point of failure in the
network, unless fault tolerance is also configured.
Advantages Disadvantages
Dynamic in nature compared to Some applications may dynamically open up new ports
static packet filtering from the server, which if a firewall is not analyzing specific
applications or prepared for this server to open up a new
port, it could cause a failure of that application for the
end user. If a firewall also supports application layer
inspection, it may be able to predict and allow this inbound
connection.
Provides a defense against Stateful technology, by itself, does not support user
spoofing and denial-of-service authentication. This, however, does not prevent a firewall
(DoS) attacks that implements stateful packet filtering from also
implementing authentication as an additional feature.
Rule Description
Rules based on These rules control access based on knowing who the user is and what
user control that user is authorized to do. This can be implemented via AAA services.
Rules based on These rules control how a particular service is used. For example, a
behavior control firewall may implement an e-mail filter to protect against spam.
Chapter 15
Table 15-2 Policy Map Actions
Policy Description When to Use It
Action
Inspect Permit and This should be used on transit traffic initiated by users who
statefully inspect expect to get replies from devices on the other side of the
the traffic firewall.
Pass Permit/allow the Traffic that does not need a reply. Also in the case of
traffic but do not protocols that do not support inspection, this policy could be
create an entry applied to the zone pair for specific outbound traffic, and be
in the stateful applied to a second zone pair for inbound traffic.
database
Drop Deny the packet Traffic you do not want to allow between the zones where
this policy map is applied.
Log Log the packets If you want to see log information about packets that were
dropped because of policy, you can add this option.
Chapter 17
Table 17-2 IDS Versus IPS
IDS IPS
Position in the network Not inline with the flow of Directly inline with the flow of
flow network traffic, the IDS is sent network traffic and every packet
copies of the original packets. goes through the sensor on its way
through the network.
Mode Promiscuous mode, out of Inline mode.
band.
Latency or delay Does not add delay to the Adds a small amount of delay
original traffic because it is not before forwarding it through the
inline. network.
Impact caused by There is no negative impact if If the sensor goes down, traffic
the sensor failing to the sensor goes down. that would normally flow through
forward packets the sensor could be impacted.
Dependent on fail open or fail
closed configuration.
Ability to prevent By itself, a promiscuous mode The IPS can drop the packet on its
malicious traffic from IDS cannot stop the original own because it is inline. The IPS
going into the network packet. Options do exist for a can also request assistance from
sensor in promiscuous mode to another device to block future
request assistance from another packets just as the IDS does. D
device that is inline which may
block future packets. An IDS can
send TCP Reset packets to break
(reset) malicious connections,
but there is no guarantee that
this will prevent an attack packet
from reaching its destination.
Normalization ability Because the IDS does not see Because the IPS is inline, it can
the original packet, it cannot normalize (manipulate or modify)
manipulate any original inline traffic inline based on a current set
traffic. of rules.
18 CCNA Security 210-260 Official Cert Guide