Home > Drag Drop Questions 2

Drag Drop Questions 2

January 7th, 2021 Go to comments

Question 1

Question 2

Question 3

Explanation

From the ACL:

access-list 107 deny tcp 207.16.12.0.0.0.3.255 any eq http
access-list 107 permit ip any any
We can deduce it block all source hosts in 207.16.12.0/22 range (which ranges from 207.16.12.0 to 207.16.15.255) via HTTP (port 80) while permit any other hosts.

Question 4

Explanation

There are four messages sent between the DHCP Client and DHCP Server: DHCPDISCOVER, DHCPOFFER, DHCPREQUEST and DHCPACKNOWLEDGEMENT. This process is often abbreviated as DORA (for Discover, Offer, Request, Acknowledgement).

Question 5

Explanation

1: connected (AD = 0)
2: static (AD = 1)
3: EBGP (AD = 20)
4: EIGRP (AD = 90)
5 :OSPF (AD = 110)
6: RIP (AD = 120)

Question 6

Explanation

Traditional Networking uses block list model because all traffic is allowed to pass through initially until we configure an ACL, prefix-list… This model is more lenient, because if no application knowledge exists, the default network configuration will let everything through. From a security perspective, it is very dangerous though – every time you allow a protocol that the application does not need, you are unnecessarily increasing your attack surface, and therefore compromising the overall application security.

In Controller-Based Networking, everything is denied by default until we explicitly allow them by a white (allow) list.

Question 7

Explanation

VLAN Hopping: By altering the VLAN ID on packets encapsulated for trunking, an attacking device can send or receive packets on various VLANs, bypassing Layer 3 security measures. VLAN hopping can be accomplished by switch spoofing or double tagging.

a. Switch spoofing:

Switch_Spoofing.jpg

The attacker can connect an unauthorized Cisco switch to a Company switch port. The unauthorized switch can send DTP frames and form a trunk with the Company Switch. If the attacker can establish a trunk link to the Company switch, it receives traffic to all VLANs through the trunk because all VLANs are allowed on a trunk by default.

(Instead of using a Cisco Switch, the attacker can use a software to create and send DTP frames).

To mitigate this type of attack, we can disable DTP.

b. Double-Tagging attack:

Double_Tagging.jpg

In this attack, the attacking computer generates frames with two 802.1Q tags. The first tag matches the native VLAN of the trunk port (VLAN 10 in this case), and the second matches the VLAN of a host it wants to attack (VLAN 20).

When the packet from the attacker reaches Switch A, Switch A only sees the first VLAN 10 and it matches with its native VLAN 10 so this VLAN tag is removed. Switch A forwards the frame out all links with the same native VLAN 10. Switch B receives the frame with an tag of VLAN 20 so it removes this tag and forwards out to the Victim computer.

Note: This attack only works if the trunk (between two switches) has the same native VLAN as the attacker.

To mitigate this type of attack, we can use VLAN access control lists (VACLs, which applies to all traffic within a VLAN. We can use VACL to drop attacker traffic to specific victims/servers) or implement Private VLANs.

Question 8

Explanation

A typical enterprise hierarchical LAN campus network design includes the following three layers:
+ Access layer: Provides workgroup/user access to the network
+ Distribution layer: Provides policy-based connectivity and controls the boundary between the access and core layers
+ Core layer: Provides fast transport between distribution switches within the enterprise campus

Reference: https://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4

Question 9

Question 10

Explanation

In the output above, three lines under “Link-local IPv6 Address” line have been blacked out so we have to figure out what they are. They are the IP address of the Wireless card and the Default gateway of this computer.

Comments (7) Comments
  1. Zane
    February 17th, 2021

    Question 2 is missing the Broadcast addresses in column 2, As well as missing the answers for which addresses are match

  2. 9tut
    February 18th, 2021

    @Zane: In fact question 2 is correct. The right columns are for Broadcast addresses only and we had four answers for this question:
    Answer:

    + 10.63.255.255/10
    + 172.16.255.39/29
    + 172.20.255.255/16
    + 192.168.255.127/25

  3. Roberto
    August 11th, 2021

    in the drag and drop the order when dragging comes the same as it appears in 9 tut?

  4. sirbee
    November 15th, 2021

    I think the answer of question 8 is wrong. the conditions must be switched like that

    Distribution layer:
    + functions as an aggregator for all the campus blocks

    Core layer:
    + establishes Layer 3 routing boundaries functions

    you know that from the Reference: https://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4

    it is written below ….

  5. sirbee
    November 15th, 2021

    Oh.. sorry my mistake

  6. The Dumper
    August 27th, 2022

    @9tut Looks like the MAC Adress in Question 10 is wrong.

  7. alex
    September 3rd, 2022

    @zane for Q2
    10.1.255.254/24 IP address is 10.1.255.254 sub net mask is 255.255.255.0 so board cast address should be 10.1.255.255 not 254 so this is wrong

    10.63.255.255/10 IP address is 10.63.255.255 sub net mask is 255.192.0.0 so board cast is 256-192=64 64-1 is 63 so board cast address is 10.63.255.255 this is correct

    /29 =255.255.255.248 /16 =255.255.0.0 /25 =255.255.255.128 for this 3 the board cast IP address is equal to board cast address so choose these

Add a Comment