Chapter 9 Flashcards
What is the primary learning objective for Microsoft Windows Network Security?
Implement security controls to protect Microsoft Windows systems and networks.
What are the three main types of vulnerabilities to secure in a Microsoft Windows network?
- Physical and logical access
- Traffic flow
- Computer and device security
Define a Local Area Network (LAN).
A LAN covers a small physical area, such as an office or building.
What does a Metropolitan Area Network (MAN) connect?
Two or more LANs but does not span an area larger than a city or town.
What is the purpose of a Wide Area Network (WAN)?
Connect multiple LANs and WANs and span very large areas.
List the types of network security controls.
- Access controls for protected resources
- Communication controls
- Anti-malware software
- Recovery plans
- Configuration management software
- Monitoring tools
- Software patch management
Fill in the blank: A collection of computers and devices joined by connection media is called a _______.
[network]
What is the function of a firewall in network security?
Filters network traffic to block suspicious packets or messages.
What is the role of a router in a network?
Connects two or more separate networks and inspects address portions of packets.
True or False: A switch can help avoid collision and congestion issues in networks.
True
What type of cable is the most common for network connections?
Unshielded twisted pair (UTP)
What is a Network File Server?
A computer or hardware device that provides secure access to its stored data for remote users.
What are the advantages of using an application server?
- Software does not need to be installed on every user’s computer
- Easier software updates
- Faster response time due to proximity to database servers
- More data stays inside the organization’s secure network
Fill in the blank: The protocol that allows encrypted remote system administration is called _______.
[Secure Shell (SSH)]
What is IPSec used for?
To secure IP communication by encrypting each IP packet.
What does the term ‘Demilitarized Zone (DMZ)’ refer to in network security?
An untrusted network with servers accessible to unauthorized users without compromising the trusted network.
List at least two common wired network connection types.
- Shielded twisted pair (STP)
- Fiber optic cable
What is the maximum transmission speed of the 802.11ac wireless protocol?
1.3 Gbps
True or False: Telnet is considered a secure protocol for remote administration.
False
What should be done before enabling any service in a secure environment?
Develop a plan for keeping the service up to date.
What is the main purpose of a network print server?
To provide the interface between computers and printers connected to the network.
Fill in the blank: Services should run as a user with the _______ necessary to perform their functions.
[minimum privileges]
What does a gateway do in a network?
Connects two or more separate networks using different protocols.
What are the layers defined in the OSI Reference Model?
Multiple layers of protocol rules for communication across a network.