Appendix C. Memory Tables Answer Key

Chapter 1

Table 1-2 Protocols at Each Layer of the TCP/IP Model

TCP/IP Layer

Protocols

Link

Ethernet, Point-to-Point (PPP)

Internet

IP

Transport

TCP/UDP

Application

HTTP, SMTP, FTP

Table 1-3 Message Unit Naming at Each Layer of the TCP/IP Model

TCP/IP Layer

Protocols

Link

Frame

Internet

Packet

Transport

Segment

Application

Application data

Table 1-4 Protocols and Devices Mapping to the OSI Layer Model and the TCP/IP Model

OSI Layer Model

TCP/IP Model

Protocols

Devices

Application

Application

FTP, HTTP, SMTP

Host, servers

Presentation

Session

Transport

Transport

TCP, UDP

Stateful firewalls

Network

IP

IP

Router

Data Link

Link

Ethernet, PPP, ATM

Switches

Physical

Ethernet (physical layer), cable, optical

Repeater

Table 1-5 Popular Ethernet Physical Layer Standards

Name

IEEE standard

Speed

Media

Maximum Distance

10BASE-T

802.3 (Ethernet)

10 Mbps

Twisted pair (copper)

100 m

100BASE-T

802.3u (FastEthernet)

100 Mbps

Twisted pair (copper)

100 m

1000BASE-T

802.3ab (GigaEthernet)

1000 Mbps

Twisted pair (copper)

100 m

1000BASE-LX

802.3z (GigaEthernet)

1000 Mbps

Long wavelength (single-mode fiber)

5 km

10GBASE-T

802.3an (10 Gigabit Ethernet)

10 GBps

Twisted pair (copper)

100 m

Table 1-6 Spanning Tree Port Costs

Port Speed

Recommended Cost

<=100 Kbps

200000000

1 Mbps

20000000

10 Mbps

2000000

100 Mbps

200000

1 Gbps

20000

10 Gbps

2000

100 Gbps

200

1 Tbps

20

10 Tbps

2

Table 1-23 TCP Services

Service

Description

Multiplexing

Allows multiple transport layer connections between the same hosts. Sockets are used to distinguish to which application a connection belongs.

Connection establishment and termination

A connection is established before data is sent. This ensures that the other host is ready to receive data. The connection is also terminated through a formal data exchange.

Reliability

Data lost due to error or from the underlying datagram can be recovered by asking the remote device to send the information again.

Flow control

TCP uses a windowing system to adjust the speed of transmission.

Chapter 2

Table 2-1 RFC 1918 Private Address Ranges

Class

IP Address Range

Networks

Number of Hosts

Class A

10.0.0.0 to 10.255.255.255

1

16,777,214

Class B

172.16.0.0 to 172.31.255.255

16

65,534

Class C

192.168.0.0 to 192.168.255.255

256

254

Chapter 4

Table 4-2 Authentication Methods

Authentication Method

Description

Examples

Authentication by knowledge

Something the user knows

Password, PIN

Authentication by ownership

Something the user owns

Smart card, badge, token

Authentication by characteristic

Something the user is or does

Fingerprint, hand geometry, keystroke dynamic

Table 4-3 Access Control Process Phases

Phase

Questions It Answers

Examples

Identification

Who are you?

User ID, IP address.

Authentication

Can you prove you are who you claim to be?

Password, badge, fingerprint.

Authorization

Can you access a resource? What can you do with that resource?

User A can access Resource B in read and write mode.

Accounting

What have you done with that resource?

User A has modified Resource B on August 31, 2016.

Table 4-5 Mapping Access Controls to Access Control Types

Administrative

Physical

Technical

Preventive

Firewall

Deterrent

Fence

Detective

Intrusion detection system

Corrective

Employee termination policy

Recovery

Data backup

Compensating

Manual user screening

Table 4-6 Overview of Access Control Models

Access Control Model

Access Decision

Reference

DAC

Access decisions and permissions are decided by the object owner.

DoD – Trusted Computer System Evaluation Criteria

MAC

Access decision is enforced by the access policy enforcer (for example, the operating system). It uses security labels.

DoD – Trusted Computer System Evaluation Criteria

RBAC

Access decisions are based on the role or function of the subject.

ANSI INCITS 359-2004

ABAC

Access decisions are based on the attributes or characteristics of the subject, object, and environment.

NIST SP 800-162

Table 4-7 Pros and Cons of Access Control Models

Access Control Model

Pros

Cons

DAC

Simpler than the other models

Security policy can be bypassed. No centralized control.

MAC

Strict control over information flow

Complex administration.

RBAC

Scalable and easy to manage

Increase in role definition.

ABAC

Flexible

More complex compared to DAC or RBAC.

Table 4-8 RADIUS vs. TACACS+ Comparison

RADIUS

TACACS+

Transport protocol

UDP.

TCP.

Security

Encrypts user password in ACCESS-REQUEST packets.

Can optionally encrypt the full payload.

AAA phases

Authentication and authorization are performed with the same exchange. Accounting is done with a separate exchange.

Authentication, authorization, and accounting are performed with separate exchanges.

Command authorization

There is no support for granular command authorization.

Allows command authorization.

Accounting

Implements strong accounting capabilities.

Provides basic accounting capabilities.

Standard

RFC 2865 (authentication and authorization) and RFC 2866 (accounting)

Cisco proprietary.

Table 4-9 IDS vs. IPS Comparison

IDS

IPS

Works on a copy of the packet (promiscuous mode).

Intercepts and processes real traffic (inline mode).

No latency added.

Adds latency due to packet processing.

Cannot stop malicious packets directly. Can work together with other devices.

Can stop malicious packets.

Some malicious packets may pass through (for example, the first packet).

Malicious packets always can be dropped.

Table 4-10 Network-Based Vs. Host-Based Detection/Prevention Systems

NIDS/NIPS

HIDS/HIPS

Software is deployed on a dedicated machine.

Software is installed on top of the host (end user) operating system (OS). It may require support for several OSs.

Easy to maintain and update.

May require an update of several endpoints.

Have visibility on all network traffic; therefore, can offer better event correlation.

Have visibility only on traffic hitting the host.

Can introduce delay due to packet processing.

Can slow down the operating system of the host.

Do not have visibility into whether an attack was successful.

Can verify whether an attack has been successful on a host.

Do not have visibility into encrypted packets.

Have visibility after encryption and can block an attack delivered via encrypted packets.

Can block an attack at the entry point.

The attacker is able to reach the target before being blocked.

Table 4-11 Network-Based Vs. Host-Based Antivirus/Antimalware Systems

Network-based Antivirus/Antimalware

Host-based Antivirus/Antimalware

Software is deployed on a dedicated machine.

Software is installed on top of the host (end user) operating system (OS). It may require support for several OSs.

Easier to maintain and update.

May require updating of several endpoints.

Have visibility into all network traffic; therefore, can offer better event correlation.

Have visibility only into traffic hitting the host.

Can introduce delay due to packet processing.

Can slow down the operating system of the host.

Do not have visibility into whether an attack was successful.

Can verify whether an attack has been successful on a host.

Do not have visibility into encrypted packets.

Have visibility after encryption and can block an attack delivered via encrypted packets.

Can block an attack at the entry point.

The attacker is able to reach the target before being blocked.

Chapter 5

Table 5-2 Summary of Password-Generation Methods

Method

Description

Pros

Cons

User-generated password

The user generates the password himself.

Simple to remember.

Usually leads to an easily guessable password.

Users may reuse the same password on multiple systems.

System-generated Password

The password is generated by the system.

Strong password.

Compliant with security policy.

Difficult to remember.

Users tend to write down the password, thus defeating the purpose.

OTP and token

The password is generated by an external entity (such as hardware or software) that is synchronized with internal resources. The device is usually protected by a user-generated password.

Users do not need to remember a difficult password.

More complicated infrastructure.

It makes use of hardware or software to generate the token, which increases maintenance and deployment costs.

Table 5-6 Comparing Cloud-Based MDM and On-Premises MDM

Cloud-Based MDM Characteristics

On-Premises MDM Characteristics

Deployed as a service and operated by a third party from the cloud

Deployed and managed within the organization

Lower cost of the solution and deployment

Higher level of control

Flexibility

Intellectual property retention

Fast deployment

Regulatory compliance

Scalability

Easier to maintain

Table 5-7 Comparing Vulnerability Scan and Penetration Assessment

Vulnerability Scan

Penetration Assessment

Works by assessing known vulnerabilities.

Can find unknown vulnerabilities.

Can be fully automated.

Mixture of automated and manual process.

Minimal impact on the system.

May completely disable the system.

Main goal is to report any hits on known vulnerabilities.

Main goal is to compromise the system.

Chapter 7

Table 7-2 IPsec Attributes

Attribute

Possible Values

Encryption

None, DES, 3DES, AES128, AES192, AES256

Hashing

MD5, SHA, null

Identity information

Network, protocol, port number

Lifetime

120–2,147,483,647 seconds 10–2,147,483,647 kilobytes

Mode

Tunnel or transport

Perfect Forward Secrecy (PFS) group

None, 1, 2, or 5

Table 7-3 Contrasting Cisco VPN Client and SSL VPN

Feature

Cisco VPN Client

Clientless SSL VPN

VPN client

Uses Cisco VPN client software for complete network access.

Uses a standard web browser to access limited corporate network resources. Eliminates the need for separate client software.

Management

You must install and configure Cisco VPN client.

You do not need to install a VPN client. No configuration is required on the client machine.

Encryption

Uses a variety of encryption and hashing algorithms.

Uses SSL encryption native to web browsers.

Connectivity

Establishes a seamless connection to the network.

Supports application connectivity through a browser portal.

Applications

Encapsulates all IP protocols, including TCP, UDP, and ICMP.

Supports limited TCP-based client/server applications.

Chapter 9

Table 9-2 List of Permission Values

Column Value

Permissions

Represented By

0

None

---

1

Execution-only

--x

2

Write

-w-

3

Execution and write

-wx

4

Read-only

r--

5

Read and execution

r-x

6

Read and write

rw-

7

Read, write, and execution

rwx

Table 9-3 UNIX Facilities

Facility

Description

auth

For requesting name and password activity

authpriv

Same as auth but data is sent to a more secured file

console

Messages directed at the system console

cron

Cron system scheduler messages

daemon

Daemon catch-all messages

ftp

FTP daemon messages

kern

Kernel-related messages

local0.local7

Local facilities defined per site

lpr

Line printing system messages

mail

Mail system messages

mark

Pseudo event used to generate timestamps in log files

news

Network News Protocol messages

ntp

Network Time Protocol messages

user

Regular user processes

uucp

UUCP subsystem

Table 9-4 UNIX Message Priorities

Priority

Description

emerg

Emergency condition, such as a system crashing

alert

Condition that should be dealt with immediately, such as a corrupted database

crit

Critical condition, such as a hardware failure

err

Standard error

warning

Standard warning

notice

No error condition but attention may be needed

info

Information message

debug

Messages used for debugging errors or programs

none

Specifies not to log messages

Chapter 11

Table 11-2 Syslog Severity Logging Levels

Level

System

Description

Emergency

0

System unusable messages

Alert

1

Immediate action required messages

Critical

2

Critical condition messages

Error

3

Error condition messages

Warning

4

Warning condition messages

Notification

5

Normal but significant messages

Information

6

Informational messages

Debugging

7

Debugging messages