Module 16: Configure Network and Device Security Flashcards

1
Q

describe a

Demilitarized Zone (DMZ)

A

this is a part of your network whee you will place devices such as web servers that must be accessible from the internet.

it is a method for seperating your protected LAN from devices that must be exposed to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this is a wireless network access method where only an SSID is needed to join the network

a further portal may be used after to accept conditions such as fair use

this is typically seen in public wifi networks such as cafes or hotels

A

what is

open authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

name 6 steps that can

help secure a wireless network

A
  1. change default SSID and passwords - these can often be easily looked up on the internet making your network extemely vulnerable
  2. disable SSID broadcast - this helps to make your network invisible to anyone/ however it is not a silver bullet since packets transmitted can still be found
  3. configure encryption using WPA2 with AES - this will encrypt all traffic passing between your device and the access point
  4. configure MAC address filtering - again this is not a silver bullet since mac addresses can be easily spoofed but deciding who can access the network based on their IP address may offer some light protection
  5. port forwarding - configure any ports that should be forwarded to a specific device such as a web server using port 80
  6. DMZ - Configure the IPv4 address for the server in the DMZ.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this action on a firewall would occur when:

  1. it is a respnse to a message that originated inside the network
  2. it is a message bound for a port that you have preconfigured
A

in which two cases would a

firewall typically not block incoming traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

in which two cases would a

firewall typically not block incoming traffic

A

this action on a firewall would occur when:

  1. it is a respnse to a message that originated inside the network
  2. it is a message bound for a port that you have preconfigured
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

example

FTP client will start a conversation on port 21 but then the server replies on port 20 this in a usual case is a problem since the conversation did not initiate on port 20 and so will be blocked

with port triggering. port 21 is the trigger port and when traffic goes outbound on port 21 then port 20 is opened for inbound traffic. this is also usefulll for gaming that may use a port for the game connection and a seperate port for voice communication

A

using FTP give an example of

port trggering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is

open authentication

A

this is a wireless network access method where only an SSID is needed to join the network

a further portal may be used after to accept conditions such as fair use

this is typically seen in public wifi networks such as cafes or hotels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

on a home router what are the 2 steps to

configure a DMZ

A

to configure this:

  1. on your router you will enable the DMZ setting and then enter the private IP address of any devices within your DMZ
  2. you will setup port forwarding. this is what will actually route the traffic to your device in the DMZ depending on what port you enable. if no ports are enabled your DMZ device is essentially still protected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

describe

trigger ports

A

(usually configured on a router) is a port or a range of ports that outbound traffic will use. when the trigger port is used it will then allow the use of a seperate configured port for inbound traffic even if traffic on that port did not originate from inside the network. when the trigger port is no longer in use it also closes the other port which was allowing inbound traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

using FTP give an example of

port trggering

A

example

FTP client will start a conversation on port 21 but then the server replies on port 20 this in a usual case is a problem since the conversation did not initiate on port 20 and so will be blocked

with port triggering. port 21 is the trigger port and when traffic goes outbound on port 21 then port 20 is opened for inbound traffic. this is also usefulll for gaming that may use a port for the game connection and a seperate port for voice communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

these are terms used to describe a threat actor trying to find vulnerable wifi networks by driving or walking around an area. sometimes chalk marks may be left outside a property to denote the state of the wireless network

A

describe

war driving / war walking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

describe

war driving / war walking

A

these are terms used to describe a threat actor trying to find vulnerable wifi networks by driving or walking around an area. sometimes chalk marks may be left outside a property to denote the state of the wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

to configure this:

  1. on your router you will enable the DMZ setting and then enter the private IP address of any devices within your DMZ
  2. you will setup port forwarding. this is what will actually route the traffic to your device in the DMZ depending on what port you enable. if no ports are enabled your DMZ device is essentially still protected
A

on a home router what are the 2 steps to

configure a DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

this is a part of your network whee you will place devices such as web servers that must be accessible from the internet.

it is a method for seperating your protected LAN from devices that must be exposed to the internet

A

describe a

Demilitarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(usually configured on a router) is a port or a range of ports that outbound traffic will use. when the trigger port is used it will then allow the use of a seperate configured port for inbound traffic even if traffic on that port did not originate from inside the network. when the trigger port is no longer in use it also closes the other port which was allowing inbound traffic

A

describe

trigger ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. change default SSID and passwords - these can often be easily looked up on the internet making your network extemely vulnerable
  2. disable SSID broadcast - this helps to make your network invisible to anyone/ however it is not a silver bullet since packets transmitted can still be found
  3. configure encryption using WPA2 with AES - this will encrypt all traffic passing between your device and the access point
  4. configure MAC address filtering - again this is not a silver bullet since mac addresses can be easily spoofed but deciding who can access the network based on their IP address may offer some light protection
  5. port forwarding - configure any ports that should be forwarded to a specific device such as a web server using port 80
  6. DMZ - Configure the IPv4 address for the server in the DMZ.
A

name 6 steps that can

help secure a wireless network