Section 16: Networking Hardening Flashcards

1
Q

What is a Simple Network Management Protocol (SNMP)?

A

Allows us to easily gather information from our various network devices back to a centralized management server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What makes SNMP v3 so secure?

A

Uses encoded parameters to provide its authentication as a part of the SNMP architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Router Advertisement Guard (RA-Guard)?

A

Operates at Layer 2 of the OSI model for IPv6 network to specify which interfaces are not allowed to have router advertisements on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Port Security?

A

Prevents unauthorized access to a switchport by identifying and limiting the MAC addresses of the hosts that are allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Dynamic ARP Inspection (DAI)?

A

Ensures only valid ARP requests and responses are relayed across the network device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Control Plane Policing (CPP)?

A

Configures a QoS filter that manages the traffic flow of control plane packets to protect the control plane of Cisco IOS routers and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Private VLANs?

A

A technique where a VLAN contains switchports that are restricted to using a single uplink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DHCP Snooping?

A

Provides security by inspecting DHCP traffic, filtering untrusted DHCP messages, and building and maintaining a DHCP snooping binding table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Strong Password?

A

Sufficiently long and complex which creates lots of possible combinations for brute force attacks to be completed in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Default VLAN labeled as?

A

VLAN 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Default VLAN?

Also Known as a NAtive VLAN

A

A VLAN where untagged traffic is put once it is received on a trunk port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Patch Management?

A

Involves planning, testing, implementing, and auditing of software patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Access Control List (ACL)?

A

A list of permissions associated with a given system or network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Role-Based Access?

A

Defines the privileges and responsibilities of administrative users who control firewalls and their ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an Explicit Deny regarding firewalls?

A

Blocks matching traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Implicit Deny regarding firewalls?

A

Blocks traffic to anything not explicitly specified

17
Q

What is MAC Filtering?

A

Defines a list of devices and only allows those on your Wi-Fi network

18
Q

What do most WAPs come pre-installed with what type of antenna?

A

Omnidirectional

19
Q

What is the pro and con for a WAP using more power levels?

A

Pro: Covers more area
Con: Radio waves leave the building which isn’t good for security

20
Q

What is a Wireless Client Isolation?

A

Prevents wireless clients from communicating with one another

21
Q

What is a Guest Network Isolation?

A

Keeps guests away from your internal network communications

22
Q

What are Pre-Shared Keys (PSK)?

A

Secures wireless networks, including those protected with WEP, WPA, WPA2, and WPA3

23
Q

What is an Extensible Authentication Protocol (EAP)?

A

Acts as a framework and transport for other authentication protocols

24
Q

What is Geofencing?

A

A virtual fence created within a certain location

25
Q

What is a Captive Portal?

A

A web page displayed to newly connected Wi-Fi users before being granted broader access to network resources

26
Q

What are some IoT Considerations? List at least 4

A
  • Understand your endpoints
  • Patch vulnerabilities
  • Change defaults credentials
  • Use encryption protocols
  • Track and manage your devices
  • Conduct test and evaluation
  • Segment IoT devices