Comptia test 1-1 Flashcards
A modem is a common SOHO network hardware that connects to the service provider cabling and transfers frames over the link. The modem type must be matched to the
network type.
A router is a common SOHO network hardware that forwards packets over the WAN Internet interface if they do not have a local destination IP address. Some appliances may provide the ability to configure local subnets, though this is not typical of the devices supplied by the service providers
do not have a local destination IP address
A switch is a common SOHO network hardware that allows local computers and other host types to connect to the network via RJ-45 ports. This will be an unmanaged switch, so no configuration is necessary.
no configuration is necessary
An access point is a common SOHO network hardware that allows hosts to connect to the network over
Wi-Fi.
Encryption is important, but in most cases, a default encryption method is already set, out of the box. The default encryption allows for quick and
immediate use of the router.
Updating the device firmware will provide the latest router features and even
updated security patches, if applicable.
The Service Set ID (SSID) is a name set up on the WiFi router for users to quickly identify and connect to it. The SSID can be broadcast or hidden from
public view.
A strong passphrase is the minimum layer of security required so that only users with the passphrase can access the WiFi router. This prevents potential hackers from gaining easy access to the
Wireless Local Area Network
Kerberos allows Single Sign On (SSO) on a network that runs the Kerberos authentication protocol. Windows Active Directory domain networks use
Kerberos.
Host-based authentication is when the server is configured with a list of authorized client public keys. The client requests authentication using one of these keys and the server generates a challenge with the public key. The client must use the matching private key it holds to decrypt the challenge and complete the authentication process. This provides non-interactive login but there is considerable risk from
intrusion if a client host’s private key is compromised.
Public key authentication cannot be used with fine-grained access controls as the access is granted to a single user account. The same sort of public key authentication method can be used for each user account. The user’s private key can be configured with a passphrase that must be input to access the key, providing an additional measure of protection compared to
host-based authentication.
Username/password is when the client submits credentials that are verified by the SSH server either against a local user database or using an
authentication server.