Chapter 17: Security Flashcards

1
Q

T or F - The wireless network is not and never will be secure. pg. 824

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Networks often broadcast their name known as an __ ___. pg. 825

A

SSID broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name three types of wireless encryption available. pg. 825

A

WEP, WPA, WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can be accessed by those who know of it, but can’t be seen on a list of available networks if it’s turned off. pg. 825

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On a number of wireless devices, the term __ __ is used in place of MAC filtering, but the two are synonymous. pg. 825

A

network lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adding __ ___ to MAC filtering takes security for the network down to the switch port level increasing your security exponentially. pg. 826

A

port authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__ __ can be crucial in allowing clients to reach the access point. pg, 826

A

antenna placement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You should avoid placing access points near __ or near the ground. pg. 826

A

metal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If the signal is actually traveling too far, some access points include __ __ __ that allow you to reduce the amount of output provided. pg. 826

A

power level controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A __ network is small enough that you can get by without issuing IP addresses to each host. pg. 826

A

SOHO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Among the security procedures you should follow like securing the physical environment, you should also change what? pg. 827

A

default usernames and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 3 things you should do to secure the SOHO wired network? pg 827

A

disable any ports that aren’t needed, assign OP addresses, and use MAC filtering to limit access to only those hosts you recognize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should you change after the installation of any network device? pg. 827

A

default password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What Windows account leaves a security risk at the workstation and should be disabled to deter those attempting to gain unauthorized access? pg. 827

A

Guest account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You can implement __ __ with most routers and typically have an option to list of deny computers with MAC addresses. pg. 827

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If you don’t know a workstation’s MAC address, use __ to find it in Windows. pg. 827

A

IPCONFIG / ALL

17
Q

__ __ addresses should be used on SOHO networks to keep from issuing addresses. pg. 827

A

Static IP

18
Q

Newer SOHO router solutions close down the ___ ___ by default which can drive you nuts when trying to see if a workstation/server/router is up and running. pg. 828

A

ICMP port

19
Q

What are the two types of protection offered by FAT? pg. 828

A

share-level and user-level access privileges

20
Q

What was introduced by Windows NT to address security problems? pg. 828

A

NTFS

21
Q

What are the types of access on an ACL list? pg. 828

A

Read-Only, Change, Full Control

22
Q

Most laptops include a built-in __ __ in which a __ __ can be added to prevent it from being carried off. pg. 829

A

security slot; cable lock