Bgp1
![]() |
![]() |
![]() |
Título del Test:![]() Bgp1 Descripción: preparacion |




Comentarios |
---|
NO HAY REGISTROS |
what is an autonomous system. a network or a collection of networks unified under a single routing policy. a collection of entities inside of an internet provider. a system inside of a network that contains a group of foreign networks. a collection of networks identified under an enterprise. BGP Messages. TCP Session Established. OPEN. UPDATE. KEEPALIVE. NOTIFICATION. path selection is based on path attributes, the administrators can influence the path changing attributes. true. false. BGP can only detect loops between ASes and cannot guarantee loop-free paths within an AS. true. false. Bgp selection order. Next hop. Local pref. AS Path. Tie breaker. Network relationships in BGP can be classified into two groups : Provider to Customer / Customer to provider. Peer-to-Peer. Which answer would best describe the Border Gateway Protocol?. Packet-switched protocol used to transmit data. Path-vector protocol designed to exchange routing and reachability information. A Routing protocol that gathers link state information from available routers to construct a map of the network. Which BGP attribute is used to prevent routing loops?. AS_PATH. MULTI_EXIT_DISC. LOCAL_PREF. Network relationships: Match the relationships with the title. Transit Provider. Single-homed Customer. Multi-homed Customer. Peering relationship. In BGP, autonomous systems are only capable of originating prefixes that they are the rightful holder of. True. False. BGP has built-in tools that can validate the authenticity of the AS path attributes announced by other ASes. True. False. bgp. The Internet is a network of Autonomous Systems (ASes). BGP speakers use. UPDATE messages contain. ASes create routing policies that dictate what traffic should be announced or received. These relationships can be provider-to-customer relationships. By default, BGP is built on trust, and ASes are vulnerable. Attackers can take advantage of these vulnerabilities to: Hijack a BGP session and break the peer connection. spoof the IP address of one of the BGP speaker's peer router. initiate a DoS attack and exhaust the victim's resources. manipulate BGP and reroute packets. intercept and modify traffic. blackhole traffic to network. Match BGPs Vulnerabilities with their description. No encryption or authentication of BGP messages. No validation for the origin of BGP announcements. No authenticity of path attributes. BGP runs over TCP. Potential attacks on BGP include: TCP/IP Protocol attacks:. BGP route manipulation attacks:. Protocol manipulation attacks:. Denial of service attacks via resource exhaustion:. BGP Route Manipulation Attacks. BGP Origin Hijacks. BGP Path Hijacks. Protocol Manipulation Attacks. manipulating BGP attributes. FRD/MRAI timers. Route Flap Damping (RFD). Minimum Route Advertisement Interval (MRAI). Match the BGP attacks with the appropriate category. TCP/IP Protocol attacks. BGP route manipulation attacks. Protocol manipulation attacks. DoS attacks (via resource exhaustion). intentional vs malicious. AS path prepending configuration with unexpected effects. Typos in the configuration ("fat-fingers"). Mis-configured BGP routing filters. Attacks to the TCP connection between two BGP peers. DoS attack on a BGP speaker via resource exhaution. Manipulated BGP routing information sent from a compromised peer. BGP Origin Hijacks BGP Path Hijacks. can occur when an AS illegitimately originates a prefix that it is not authorised to announce. The attacker can originate the exact prefix belonging to the legitimate holder (Prefix Hijack) or a more specific prefix than what the legitimate holder announces (Sub-prefix Hijack). When an AS modifies the AS_PATH attribute in a BGP UPDATE message in such a way that it appears to have a shorter or longer path to a prefix, it is called a ____________. BGP Path Hijacks. An attacker can send a fake path with a correct origin. An attacker can send a fake path with a different origin to divert traffic. A BGP Hijack can be used to redirect legitimate traffic ... ... to another AS creating a traffic loop. ... to another AS and send it back to the legitimate AS. ... to another AS amplifying the amount of traffic. ... to anothert AS and throw it away. ... to another AS and inspect it. Which of the following statements are true about accidental route leaks?. they are only caused by malicious attackers. they involve legitimate prefixes that propagate beyond the intended scope. an attacker can use it to inspect traffic. the wrong AS is announced by mistake. commonly caused by wrong route filtering configuration. they involves bogus prefixes that propagate beyond their scope. Based on the examples above, which of the following statements are correct?. Route leaks can cause problems for other ASes but also for the announcing AS that receives the additional traffic. Route leaks can only affect a small number of prefixes. BGP route hijacks can be used as a first step of a larger attack that redirects users to a malicious service. BGP Hijacks can not come from private ASNs. BGP Hijacks can come from customers that are using BGP. Based on the examples above, which of the following statements are correct?. Proper BGP routing filtering would have prevented many of the known incidents. Some attacks are based on users' insecure practices. Filtering for customers using BGP is not useful if they use a private ASN. Sometimes it is difficult to know if an incident was on purpose or by mistake. ASNs that are several ASNs away from the AS causing the incident are less affected. There are a variety of ways to cause BGP incidents. TCP or BGP messages can be exploited, spoofed or manipulated. Any AS can announce any prefix. Any AS can prepend any ASN to the AS path. Fake routing information could be propagated over the Internet and disrupt overall Internet behaviour. There are many ways these attacks and incidents can affect your networks. Hijacking a BGP session and breaking the peer-to-peer connection. Spoofing the IP address of a BGP speaker's peer's router. Initiating a DoS attack to exhaust a victim's resources. Manipulating BGP and rerouting traffic. Intercepting and modifying traffic. Black-holing the entire network etc. What is the main purpose of the Border Gateway Protocol?. To gather information from available routers to construct a full topology map of the Internet. To transport packets across the Internet. To exchange routing and reachability information between peering Autonomous Systems. |