Harding the Network Flashcards

1
Q

What is secure SNMP?

A

Secure SNMP: Using SNMPv3 for secure management of network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Router Advertisement (RA) Guard?

A

Router Advertisement (RA) Guard: Protects against rogue RA messages in IPv6 networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is port security?

A

Port security: Limits the devices that can connect to a network switch port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is dynamic ARP inspection?

A

Dynamic ARP inspection: Prevents ARP spoofing attacks by validating ARP packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is control plane policing?

A

Control plane policing: Limits traffic to the control plane to protect router resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are private VLANs?

A

Private VLANs: Isolate devices within the same VLAN for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why should unneeded switchports be disabled?

A

Disable unneeded switchports: Reduces attack surface by deactivating unused ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why should unneeded network services be disabled?

A

Disable unneeded network services: Minimizes vulnerabilities by turning off unused services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why should default passwords be changed?

A

Change default passwords: Prevents unauthorized access using well-known default credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is password complexity/length important?

A

Password complexity/length: Increases security by making passwords harder to guess.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is DHCP snooping?

A

DHCP snooping: Prevents rogue DHCP servers by monitoring DHCP traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why should the default VLAN be changed?

A

Change default VLAN: Reduces risk of VLAN hopping attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is patch and firmware management?

A

Patch and firmware management: Keeps devices secure with the latest updates and fixes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an access control list (ACL)?

A

Access control list (ACL): Controls network traffic flow based on rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is role-based access?

A

Role-based access: Limits access based on user roles to enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are firewall rules?

A

Firewall rules: Define what traffic is allowed or blocked in a network.

17
Q

What is explicit deny?

A

Explicit deny: Clearly specifies what traffic is not allowed.

18
Q

What is implicit deny?

A

Implicit deny: Blocks all traffic by default unless explicitly allowed.

19
Q

What is MAC filtering?

A

MAC filtering: Restricts network access to specific devices based on their MAC address.

20
Q

Why is antenna placement important in wireless security?

A

Antenna placement: Optimizes wireless coverage and reduces interference.

21
Q

Why are power levels important in wireless security?

A

Power levels: Adjusts signal strength to limit wireless coverage to the desired area.

22
Q

What is wireless client isolation?

A

Wireless client isolation: Prevents wireless clients from communicating with each other.

23
Q

What is guest network isolation?

A

Guest network isolation: Segregates guest network traffic from the main network.

24
Q

What are preshared keys (PSKs)?

A

Preshared keys (PSKs): Shared passwords for securing wireless networks.

25
Q

What is Extensible Authentication Protocol (EAP)?

A

Extensible Authentication Protocol (EAP): A framework for various authentication methods.

26
Q

What is geofencing?

A

Geofencing: Restricts network access based on geographic location.

27
Q

What is a captive portal?

A

Captive portal: A web page that users must interact with before accessing a network.

28
Q

What are IoT access considerations?

A

IoT access considerations: Implementing security measures specific to Internet of Things devices.