Lesson 9: Evaluate Network Security Capabilities Flashcards

1
Q

What is the purpose of network security baselines, and how can you establish the security baseline?

A

To establish minimum security configurations for devices like firewalls, routers, switches, and access points.

Tools like Security Content Automation Protocol (SCAP) can automate assessments against defined baselines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are examples of benchmarks and configuration guides?

A

CIS Benchmarks and DISA STIGs provide secure configuration standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What tools assist in deployment and compliance monitoring?

A

Puppet, Ansible, CIS-CAT Pro, and SCAP Compliance Checker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can switches/routers be secured?

A

By changing default credentials, disabling unnecessary services, and enabling port security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can server systems be hardened?

A

By applying patches, configuring firewalls, enabling logging, and enforcing access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What considerations are important for wireless network installation?

A

WAP Placement: Ensures seamless coverage and minimizes rogue AP vulnerabilities.

Use of site surveys and heat maps to optimize placement and signal integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How have wireless encryption standards evolved?

A

Evolution from
WEP → WPA → WPA2 → WPA3
with SAE protocol for enhanced security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is WPA2/WPA3-Enterprise?

A

A wireless encryption standard that employs 802.1x authentication and RADIUS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is RADIUS used for?

A

A centralized authentication and accounting system supporting EAP authentication methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of Network Access Control (NAC)?

A

Enforces compliance policies on devices before granting network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the types of NAC configurations?

A

Agent-based - (persistent/non-persistent). Agent-based is more in-depth.
ex. You have an “agent” in the house that is able to look around and report back what it sees

Agentless - configurations support diverse environments.
ex. You see from the outside and report back what you see

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do Access Control Lists (ACLs) do?

A

Filter network traffic based on protocols, IPs, or ports, using principles like implicit deny, pen-testing and logging to secure configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are screened subnets used for?

A

They protect internal networks by placing publicly accessible services in isolated zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do IDS/IPS systems differ between host-based and network-based types?

A

Host-Based (HIDS/HIPS): Monitors local activity, system files, and logs (e.g., OSSEC).

Network-Based (NIDS/NIPS): Analyzes packet traffic for threats across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What tools support IDS/IPS detection?

A

Tools like Snort and Suricata use signature and behavioral-based detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of trend analysis in IDS/IPS?

A

It tracks event patterns to identify and mitigate emerging threats.

17
Q

What is agent-based web filtering?

A

Agent-based filtering enforces policies at the device level, offering granular HTTPS filtering and analytics even off-network.

18
Q

What are the benefits of centralized web filtering via proxy servers?

A

Filters URL traffic and content categories.

Blocks malicious/restricted downloads.

Includes URL scanning, reputation-based filtering, and logging of activity.

19
Q

What challenges are associated with web filtering?

A

Overblocking impedes legitimate work. It occurs when the filter is too restrictive and blocks access to useful websites.

Underblocking leaves gaps and allows access to potentially harmful websites.

Managing encrypted traffic (HTTPS) introduces privacy and compliance concerns.