4.3 Given a scenario, apply network security features, defense techniques, and solutions. Flashcards

1
Q

How would you harden a device?

A
  1. Disable unused ports and services
    - Use firewall to control access to ports (NGFW)
  2. Change default passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is NAC?

A
  • Network Access Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is port security?

A
  • Will alert you or disable port if a new system is plugged into the network (based on your MAC Addresses).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is 802.1X?

A
  • This is the standard that authenticates users and devices trying to connect to a network, whether it’s wired or wireless (Network Access Control).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is MAC filtering?

A
  • Limit access through the physical hardware (additional administration with visitors or guests)
  • One disadvantage is that it is easy to find working MAC addresses through wireless LAN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is key management?

A
  • Many different keys that need to be managed over many different services.
  • You should manage all keys from a centralized manager.
  • All key management should be done from one console.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an ACL?

A
  • Access Control List
  • A list of traffic that is allowed or disallowed based off of different groupings of categories (source IP, destination IP, port number, time of day, application, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a URL filtering?

A
  • Allow or restrict traffic based on URL
  • Can be managed by category as well: auction, hacking, Malware, Travel, Recreation, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is content filtering?

A
  • Control traffic based on data within the content (i.e. URL filtering)
  • Corporate control of outbound and inbound data
  • Control of inappropriate content (NSFW)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a security zone?

A
  • More flexible (and secure) than an IP address range; allows more generalized grouping of what part of the network or other network groups you can communicate with.
  • Examples: Trusted/Untrusted (or) Internal/External (or) secure/unsecured
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a screened subnet?

A
  • An additional layer of security between you and the Internet
  • Public access to public resources while the private data remains inaccessible.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly