Network Hardening Flashcards

1
Q

Hardening

A

Securing a system by reducing its surface of vulnerabilities

Healthy balance between operations and security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Patch Management

A

Involves planning, testing, implementing, and auditing of software patches
Provides security
Increases uptime
Ensures compliance
Improves features
Ensure patches don’t create new problems once installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Planning

A

Tracks available patches and updates and determines how to test
and deploy each patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Testing

A

Tests any patch received from a manufacturer prior to automating
its deployment through the network
Have a small test network, lab, or machine for testing new
patches before deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Implementing/ Implementation

A

Deploys the patch to all of the workstations and servers that
require it
Disable the Windows Update service from running automatically
on the workstation
Also implement patching through a mobile device manager
(MDM), if needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Auditing

A

Scans the network and determines if the patch was installed
properly and if there are any unexpected failures that may have
occurred
Also conduct firmware management for your network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password Policy

A

Specifies minimum password length, complexity, periodic changes, and
limits on password reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Strong Password

A

Sufficiently long and complex which creates lots of possible combinations
for brute force attacks to be completed in time
Long vs Complex
Passwords should be up to 64 ASCII characters long
Password aging policies should not be enforced
Change default passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unneeded Services

A

A service is an application that runs in the background of an operating system or
device to perform a specific function
Disable any services that are not needed for business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Least Functionality

A

Process of configuring a device, a server, or a workstation to only provide
essential services required by the user
AutoSecure CLI command can be used on Cisco devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port Security

A

Prevents unauthorized access to a switchport by identifying and limiting
the MAC addresses of the hosts that are allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Static Configuration Switch

A

Allows an administrator to define the static MAC addresses to use on a
given switchport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dynamic Learning

A

Defines a maximum number of MAC addresses for a port and blocks new
devices that are not on the learned list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Private VLAN (Port Isolation)

A
A technique where a VLAN contains switchports that are restricted to
using a single uplink
Primary
Secondary isolated
Secondary community
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Primary VLAN

A

Forwards frames downstream to all of the secondary VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Isolated VLAN

A

Includes switchports that can reach the primary VLAN but no other
secondary VLANs

17
Q

Community VLAN

A

Includes switchports that can communicate with each other and the
primary VLAN but not other secondary VLANs
Default VLAN is known as VLAN 1

18
Q

Promiscuous Port (P-Port)

A
Can communicate with anything connected to the primary
or secondary VLANs
Host Ports
Isolated Ports (I-Port)
Community Ports (C-Port)
19
Q

Isolated Port (I-Port)

A

Can communicate upwards to a P-Port and cannot talk

with other I-Ports

20
Q

Community Port (C-Port)

A

Can communicate with P-Ports and other C-Ports on the

same community VLAN

21
Q

Native VLAN

A

VLAN where untagged traffic is put once it is received on a trunk port

22
Q

(DAI)

A

Dynamic ARP Inspection (DAI)
Validates the Address Resolution Protocol (ARP) packets in your network
Ensures only valid ARP requests and responses are relayed across the
network device
Invalid ARP packets are dropped and not forwarded

23
Q

DHCP Snooping

A

Provides security by inspecting DHCP traffic, filtering untrusted DHCP
messages, and building and maintaining a DHCP snooping binding table

24
Q

Untrusted Interface

A

Any interface that is configured to receive messages from outside the
network or firewall

25
Q

Trusted Interface

A

Any interface that is configured to receive messages only from within the
network
Configure switches and VLANs to allow DHCP snooping

26
Q

(RA-Guard)

A

IPv6 Router Advertisement Guard (RA-Guard)
Mitigates attack vectors based on forged ICMPv6 router advertisement
messages
Operates at Layer 2 of the OSI model for IPv6 networks to specify which
interfaces are not allows to have router advertisements on

27
Q

(CPP)

A

Control Plane Policing (CPP)

Configures a QoS filter that manages the traffic flow of control plane

28
Q

SNMP

A

Allows us to easily gather information from our various network devices
back to a centralized management server
Community strings grant access to portions of the device management
planes
Ensure you are NOT using SNMP v1 or SNMP v2
Combine with whitelisting of the Management Information Base (MIB)
Segregate SNMP traffic onto a separate management network

29
Q

(ACL)

A

Access Control List (ACL)
A list of permissions associated with a given system or network resource
Block SSH for a single computer based on its IP address
Block any IP using port 110
Block any IP and any port from outside the LAN
Most specific first

30
Q

Explicit Deny

A

Blocks matching traffic

31
Q

Implicit Deny

A

Blocks traffic to anything not explicitly specified

32
Q

MAC Filtering

A

Defines a list of devices and only allows those on your Wi-Fi network
Explicit allow
Implicit allow
Always use explicit allow

33
Q

Wireless Client Isolation

A

Prevents wireless clients from communicating with one another
Wireless access points begin to operate like a switch using private VLANs

34
Q

Guest Network Isolation

A

Keeps guests away from your internal network communications

35
Q

Pre-Shared Key (PSK)

A

Secures wireless networks, including those protected with WEP, WPA,
WPA2, and WPA3
Ensure you choose a long and strong password