IT APPLICATIONS 7: CONFIGURING SOHO NETWORK SECURITY Flashcards
Firewall downloads curated reputation databases that associate IP address ranges, FQDNs, and URL web addresses
Content Filtering
Hosts are placed in a separate network segment with a different IP subnet address range than the rest of the LAN
Screened subnet
Router takes a request from an internet host for a particular service and sends the request to a designated host on the LAN
Port forward
Create a reservation so the server always assigns the same IP address to the host
DHCP Reservation
Set up applications that require more than one port, such as file transfer protocol (FTP) servers
Port triggering
What are the old legacy wireless encryption mechanisms is the administrator going to change?
WPA & WEP
Obtaining a password file or by sniffing unencrypted traffic on the network
Plaintext authentication
Likely to trust scripts that appear to come from a site the user has chosen to visit
XSS (Cross-Site Scripting)
Penetration tester develops a pretext scenario to give themselves an opportunity to interact with an employee.
Impersonation
AAA protocol like RADIUS, but it is typically used for device administration rather than user access to the network
TACACS+
Used to authenticate connections by wireless and VPN users and not routers, switches or access points
RADIUS
Metal detector that is often deployed at airports and in public buildings to identify concealed weapons or other items
Magnetometer
A server administrator wants to secure a whole rack of servers. What would be the best way to secure access to the servers?
Cabinet locks
A network professional sets up the ability to authenticate over Extensible Authentication Protocol over Wireless (EAPoW), what needs to be configured?
Active Directory