CCNA Security v5
CCNA Security v5
What is the purpose in configuring an IOS IPS crypto key when enabling IOS
IPS on a Cisco router?
o to secure the IOS image in flash
o to enable Cisco Configuration Professional to be launched securely
o to encrypt the master signature file
o to verify the digital signature for the master signature file*
The crypto key verifies the digital signature for the master signature file (sigdef-
default.xml). The content of the file is signed by a Cisco private key to guarantee its
authenticity and integrity.
2. Refer to the exhibit. What is the result of issuing the Cisco IOS IPS commands
on router R1?
In configuring IOS IPS with the command ip ips, an optional extended or standard
ACL can be used to filter the scanned traffic. All traffic that is permitted by the ACL
is subject to inspection by the IPS. Traffic that is denied by the ACL is not inspected
by the IPS.
Alerts generated by an IPS should be monitored closely to ensure proper actions are
taken against malicious attacks. IPS solutions incorporate two types of alerts, atomic
alerts and summary alerts. Atomic alerts are generated every time a signature triggers.
A summary alert is a single alert that indicates multiple occurrences of the same
signature from the same source address or port. With a summary alter, the first
detection of the attack triggers a normal alert. Subsequent detection of the same attack
is counted until the end of the signature summary interval. When the length of time
specified by the summary interval has elapsed, a summary alarm is sent, indicating
the number of alarms that occurred during the time interval.
5. In configuring a Cisco router to prepare for IPS and VPN features, a network
administrator opens the file realm-cisco.pub.key.txt, and copies and pastes the
contents to the router at the global configuration prompt. What is the result
after this configuration step?
o The router is authenticated with the Cisco secure IPS resource web server.
o A pair of public/secret keys is created for IPsec VPN operation.
o A crypto key is created for IOS IPS to verify the master signature file.*
o A pair of public/secret keys is created for the router to serve as an SSH server.
The third step in implementing IOS IPS is to configure the Cisco IOS IPS public key
that is located in the realm-cisco.pub.key.txt file. This public key is used to verify
digital signature for the master signature file, and can be downloaded from cisco.com.
To configure the IOS IPS crypto key, open the text file, and copy and paste the
contents to the router at the global configuration prompt. Public/private key pairs for
IPsec VPN and SSH server are generated using different methods.
6. Which two benefits does the IPS version 5.x signature format provide over the
version 4.x signature format? (Choose two.)
o support for IPX and AppleTalk protocols
o addition of signature micro engines
o support for comma-delimited data import
o support for encrypted signature parameters*
o addition of a signature risk rating*
Since IOS 12.4(11)T, Cisco introduced version 5.x IPS signature format. The new
version supports encrypted signature parameters and other features such as signature
risk rating, which rates the signature on security risk.
9. Which type of IPS signature detection is used to distract and confuse attackers?
o honeypot-based detection*
o policy-based detection
o pattern-based detection
o anomaly-based detection
The honeypot-based detection method uses dummy servers to attract attacks. The
purpose of the honey pot approach is to distract attacks away from real network
devices. After capturing the attack activities on honeypot servers, network
administrators can analyze incoming types of attacks and malicious traffic patterns.
10. Which statement is true about an atomic alert that is generated by an IPS?
o It is an alert that is used only when a logging attack has begun.
o It is a single alert sent for multiple occurrences of the same signature.
o It is an alert that is generated every time a specific signature has been
found.*
o It is both a normal alarm and a summary alarm being sent simultaneously at
set intervals.
The two main alert generation mechanisms for IDS/IPS devices are atomic and
summary alerts. Atomic alerts are generated every time a signature triggers. With a
summary alert, a single atomic alert is generated for the first detection of an attack.
Then the duplicate alarms are counted, but not sent, for a specific time period. When
it reaches the specified time period, an alert is sent that indicates the number of alarms
that occurred during the time interval.
11. Refer to the exhibit. Based on the configuration, which traffic will be examined
by the IPS that is configured on router R1?
Because the IPS inspection is configured on the S0/0/0 interface with inbound
direction, but the ACL source address range is 192.168.0.0/16 and the traffic type is
http established, there will be no traffic to match these criteria (note, there is no web
server on LAN 1 or LAN 2). Hence no traffic inspection will take place.
12. A network administrator suspects the default setting of the ip ips notify sdee
command has caused performance degradation on the Cisco IOS IPS router.
The network administrator enters the ip sdee events 50 command in an attempt
to remedy the performance issues. What is the immediate effect of this
command?
o All events that were stored in the original buffer are saved, while a new buffer
is created to store new events.
o All events that were stored in the previous buffer are lost.*
o The newest 50 events from the original buffer are saved and all others are
deleted.
o The oldest 50 events of the original buffer are deleted.
When sending IPS notification with SDEE format, the buffer on the router stores up
to 200 events by default. If a smaller buffer is requested, all stored events are lost. If a
larger buffer is requested, all stored events are saved. The default buffer can be altered
with the ip sdee events command. All stored events are lost when Cisco SDEE
notification is disabled. A new buffer is allocated when the notifications are re-
enabled.
In promiscuous mode, also known as passive mode, the flow of traffic is unaffected
because the IDS sensor analyzes copies of traffic instead of actual forwarded packets.
14. What is a required condition to enable IPS activity reporting using the SDEE
format?
o Create an IOS IPS configuration directory in flash.
o Enable an HTTP or HTTPS service on the router.*
o Configure the signature category.
o Issue the ip ips notify log command.
To enable IPS activity reporting format using SDEE, the HTTP or HTTPS server
must first be enabled on the router. If the HTTP server is not enabled, the router
cannot respond to the SDEE clients because it cannot see the requests. The ip ips
notify log command will send notification using syslog. The tasks of configuring the
signature category and creating an IOS IPS configuration directory in flash are
necessary to implement IOS IPS, but they are not directly associated with SDEE
feature.
15. Refer to the exhibit. Which statement best describes how incoming traffic on
serial 0/0 is handled?
o Traffic that is coming from any source other than 172.31.235.0/24 will be
scanned and reported.
o Traffic not matching ACL 100 will be dropped.
o Traffic not matching ACL 100 will be scanned and reported.
o Traffic that is sourced from 172.31.235.0/24 will be sent directly to its
destination without being scanned or reported.
o Traffic matching ACL 100 will be scanned and reported.*
o Traffic that is sourced from 172.31.235.0/24 will be scanned and reported.
16. Refer to the exhibit. Based on the IPS configuration provided, which conclusion
can be drawn?
o The signatures in all categories will be compiled into memory and used by the
IPS.
o The signatures in all categories will be retired and not be used by the IPS.
o Only the signatures in the ios_ips basic category will be compiled into
memory and used by the IPS.*
o The signatures in the ios_ips basic category will be retired and the remaining
signatures will be compiled into memory and used by the IPS.
The IPS signature in the all category is retired, which means no signatures are
compiled into memory. The IPS signature ios_ips basic category is unretired (by the
command retired false), resulting in the signatures in the ios_ips basic being compiled
into RAM for traffic inspection.
The disadvantage of operating with mirrored traffic is that the IDS cannot stop
malicious single-packet attacks from reaching the target before responding to the
attack. Also, an IDS often requires assistance from other networking devices, such as
routers and firewalls, to respond to an attack. An advantage of an IDS is that by
working offline using mirrored traffic, it has no impact on traffic flow.
19. What are two shared characteristics of the IDS and the IPS? (Choose two.)
o Both use signatures to detect malicious traffic.*
o Both analyze copies of network traffic.
o Both have minimal impact on network performance.
o Both rely on an additional network device to respond to malicious traffic.
o Both are deployed as sensors.*
Both the IDS and the IPS are deployed as sensors and use signatures to detect
malicious traffic. The IDS analyzes copies of network traffic, which results in
minimal impact on network performance. The IDS also relies on an IPS to stop
malicious traffic.
20. Refer to the exhibit. A network administrator enters the command on a Cisco
IOS IPS router. What is the effect?
The ip ips notify command is used to set the IPS event notification. This command
has two options, log and sdee. The log option is to specify that notifications are sent in
syslog format. The sdee option is to specify that notifications are sent in SDEE
format. If no option is specified, by default, notifications are sent in syslog format.
Network-based IPS devices are implemented as inline mode to actively monitor the
traffic on networks. They can take immediate actions when security criteria match.
One limitation of them is that they cannot monitor/inspect encrypted packets.
22. An IPS sensor has detected the string confidential across multiple packets in a
TCP session. Which type of signature trigger and signature type does this
describe?
o Trigger: Policy-based detection
Type: Atomic signature
o Trigger: Policy-based detection
Type: Composite signature
o Trigger: Anomaly-based detection
Type: Atomic signature
o Trigger: Anomaly-based detection
Type: Composite signature
o Trigger: Pattern-based detection
Type: Atomic signature
o Trigger: Pattern-based detection
Type: Composite signature*