Certmaster Applying Network Hardening Techniques Flashcards
A cyber technician needs to draft a policy for the organization to mitigate the risk from route processor vulnerabilities. What is the name of this type of policy?
A.Firewall access control lists (ACLs)
B.Control plane policing
C.Endpoint security
D.Hardening
B
A control plane policing policy mitigates the risk from route processor vulnerabilities. Such a policy can use ACLs to allow or deny control traffic from certain sources and apply rate-limiting if a source threatens to overwhelm the route processor.
A network technician configures firewall access control lists (ACLs) based on the principle of least access. This is the same as the principle of least privilege; only allow the minimum amount of traffic required to operate valid network services and no more.
Endpoint security is a set of security procedures and technologies designed to restrict network access at a device level.
Deploying systems in a secure configuration are known as device hardening.
An organization contacts the cyber security team and requests a feature to provide secure wireless network access for a specific geographical area of the building complex. Select the appropriate answers that support this request. (Select all that apply.)
A.Preshared keys (PSKs)
B.Captive Portal
C.Geofencing
D.VLAN
A, B, C
Group authentication allows stations to connect to the network using a shared passphrase, which generates a preshared key (PSK).
A guest network might redirect stations to a secure web page to perform authentication. The user must authenticate to the page and meet other administrator-set requirements, such as accepting a use policy, before the station can use the network.
Geofencing can be used to ensure that the station is within a valid geographic area to access the network, such as ensuring the device is within a building rather than trying to access the WLAN from a car park or other external location.
The virtual LAN (VLAN) feature of managed Ethernet switches typically deploys to enforce segmentation policies.