Chapter 13 Authentication and Access Control Flashcards

1
Q

This is the first line of defense went it comes to securing access to your resources on an network. p 432

A

Security Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security filtering main 2 purposes is to do what. p 432

A

Ensure proper authentication and to make data being transported is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some ways you can security filter in a network? p 432-433

A

Access Control List and Port filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where does ACL typically reside? p 432

A

On the router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do ACL work? p 432

A

By determining which routes are allowed to route through the router based on the requesting devices’s source or destination IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F When configuring ACLs it is good to include “deny any addresses from any local host address (127.0.0.0/8)”. p 433

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F ACLs can be port filter based as well as IP addresses? p 433

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Successful firewall management involves being aware of and allowing only the ports to do what? p 433

A

Port just to keep things running no more no less than necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the method of tunneling in networks? p 434

A

tunneling encapsulates one protocol within another to ensure that a transmission is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F VPNs are not very secure. p 434

A

False .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly