Chapter 10
A1: | b,e |
A2: | e |
A3: | b |
A4: | b |
A5: | d,e |
A6: | b |
A7: | c |
A8: | e |
A9: | c |
A10: | d |
A11: | a,d |
A12: | b,d |
Q&A
1: | The flow of network management traffic that follows the same path as normal data is referred to as a(n) ___-band traffic flow. |
A1: | In |
2: | Of the three remote-access protocols discussed in this chapter, which is the least secure and why? |
A2: | Telnet. Data, including usernames and passwords, is sent in clear text. |
3: | What is the primary goal of SAFE in reference to network management? |
A3: | The secure management of all devices and hosts within a network. |
4: | Give the reason for using tunneling protocols with management protocols. |
A4: | The main reason for tunneling a management protocol is to secure a normally insecure protocol. An example would be the tunneling of TFTP data. Without tunneling, this data is sent in clear text and is vulnerable to various attacks.Additionally, the remote management of a device that is outside of your management domain benefits from the use of a tunneling protocol such as IPSec. |
5: | Out-of-band management normally uses a(n) ________ network for management traffic. |
A5: | Parallel |
6: | Name two usage categories that network management protocols provide? |
A6: | Network management protocols provide the following usage categories:
|
7: | A network administrator should always be aware of the level of ________ a management protocol provides. |
A7: | Security |
8: | What ports does SNMP use and what is the function of each port? |
A8: | UDP 161 Agents listen on this portUDP 162 Used for trap reporting to the manager |
9: | SSH is a secure shell program and provides protection from ___________, ___________, and _________________ attacks. |
A9: | DNS, IP spoofing, IP source-routing |
10: | What public-key cryptosystem does SSL use during the initial exchange or handshake process? |
A10: | RSA |
11: | What version of SNMP should you use if you want to ensure that SNMP traffic is encrypted? |
A11: | SNMP version 3 |
12: | ______ management protocols should always be used in preference to ________ protocols. |
A12: | Secure, insecure |
13: | NTP version 3 supports cryptographic authentication between peers. Why is this useful? |
A13: | Without this authentication, it is possible for an attacker to send bogus NTP data and, hence, affect time-sensitive services such as digital certificates, which can lead to a potential DoS. |
14: | SSH can use what ciphers? |
A14: | RC2, RC4, IDEA, DES, and 3DES. |
15: | If you cannot secure management data for whatever reason, you should always be aware of the potential for what? |
A15: | Data interception and falsification |
