Chapter 17: Security Flashcards
T or F - The wireless network is not and never will be secure. pg. 824
True
Networks often broadcast their name known as an __ ___. pg. 825
SSID broadcast
Name three types of wireless encryption available. pg. 825
WEP, WPA, WPA2
What can be accessed by those who know of it, but can’t be seen on a list of available networks if it’s turned off. pg. 825
SSID
On a number of wireless devices, the term __ __ is used in place of MAC filtering, but the two are synonymous. pg. 825
network lock
Adding __ ___ to MAC filtering takes security for the network down to the switch port level increasing your security exponentially. pg. 826
port authentication
__ __ can be crucial in allowing clients to reach the access point. pg, 826
antenna placement
You should avoid placing access points near __ or near the ground. pg. 826
metal
If the signal is actually traveling too far, some access points include __ __ __ that allow you to reduce the amount of output provided. pg. 826
power level controls
A __ network is small enough that you can get by without issuing IP addresses to each host. pg. 826
SOHO
Among the security procedures you should follow like securing the physical environment, you should also change what? pg. 827
default usernames and passwords
What are 3 things you should do to secure the SOHO wired network? pg 827
disable any ports that aren’t needed, assign OP addresses, and use MAC filtering to limit access to only those hosts you recognize
What should you change after the installation of any network device? pg. 827
default password
What Windows account leaves a security risk at the workstation and should be disabled to deter those attempting to gain unauthorized access? pg. 827
Guest account
You can implement __ __ with most routers and typically have an option to list of deny computers with MAC addresses. pg. 827
MAC filtering