Implement secure network management & reporting

Posted on
Like what you see? Share it.Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

Questions derived from the 642-552 – Securing Cisco Network Devices Exam Cisco Self-Test Software Practice Test.

 

Objective: Implement secure network management and reporting
SubObjective: Describe SNMPv3 and NTPv3

 

Item Number: 642-552.5.4.7
Multiple Answer, Multiple Choice

 

Which of the following indicate the security vulnerabilities of Simple Network Management Protocol (SNMP) Version 1? (Choose two.)

 

 

  1. It uses DES encryption.
  2. It uses clear-text community strings.
  3. It is prone to TCP SYN attacks.
  4. It broadcasts management packets.
  5. Clear text strings are repeatedly sent over network.

 

Answer:
B. It uses clear-text community strings.
E. Clear text strings are repeatedly sent over network.

 

Tutorial:
SNMP Version 1 has the following security vulnerabilities:

 

 

  • Uses clear-text community strings.
  • As part of periodic polling, SNMP sends the community strings repeatedly over the network.

 

Data Encryption Standard (DES) is a security feature introduced in SNMP Version 3. It is an encryption standard which ensures confidentiality of SNMP data.

 

SNMP uses User Datagram Protocol (UDP) at the transport layer and is not prone to TCP specific attacks like TCP SYN attack. TCP SYN attack exploits basic weaknesses found in TCP/IP protocol. The attack occurs when the attacker sends thousands of SYN packets to the victim, forcing them to wait for replies that never come.

 

You use the snmp-server command to configure the IP address of the host machine running Network Management System (NMS). All SNMP trap messages are logged at NMS and are sent through unicast packets.

 

Reference:
http://www.cisco.com/en/US/products/ps6870/products_configuration_guide_chapter09186a0080718ccd.html#wp1106982

 

http://www.cisco.com/en/US/products/ps5989/products_user_guide_chapter09186a008018178a.html

Like what you see? Share it.Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment: