Week 4 Flashcards

1
Q

Network hardening

A

The process of securing a network by reducing its potential vulnerabilities through configuration changes and taking specific steps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Implicit deny

A

A network security concept where anything not explicitly permitted or allowed should be denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Analyzing logs

A

The practice of collecting logs from different network and sometimes client devices on your network, then performing an automated analysis on them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Correlation analysis

A

The process of taking log data from different systems and matching events across the systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Splunk

A

A popular and powerful logs analysis system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Flood guards

A

Provide protection against DoS attacks

A good flood guard, especially if you are the sole IT person in your company, is Failed to Ban

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DHCP snooping

A

A way to prevent Rouge DHCP Server Attacks. It’s a switch capability (not all switches have this feature) that monitors DHCP traffic, track IP assignments, and map them to hosts connected to switch ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does DAI do on enterprise switches?

A

It detects forged gratuitous ARP packets and drops them using the help of the DHCP table from the DHCP snooping feature ; it enforces great limiting of ARP packets per port to prevent ARP scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPSG

A

Uses the snoop to dynamically create ACLs for each switchboard. This drops packets that don’t match the IP address for the port based on the DHCP snooping table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EAP-TLS

A

An authentication type supported by EAP that uses TLS to provide mutual authentication of both the client and the authenticating server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Host based firewall

A

Can protect mobile devices like laptops from being compromised in potentially malicious environments like airport Wi-Fi. They also protect other hosts from being compromised by a corrupt device on the network, which is something network firewalls may not be able to help defend against

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet sniffing (packet capture)

A

The process of intercepting network packets in their entirety for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Promiscuous mode

A

A type of computer networking operational mode in which all network data packets can be accessed and viewed by all network adapters operating in this mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port mirroring

A

Allows the switch to take all packets from a specified port, port range, or entire VLAN and mirror the packets to a specified switch port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Monitor mode

A

Allows us to scan across channels to see all wireless traffic being sent by APs and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tcpdump

A

A popular lightweight command line based utility that you can use to capture and analyze packets

17
Q

IDS/IPS

A

Operate by monitoring network traffic and analysing it

18
Q

Network intrusion detection system (NIDS)

A

The detection system would deployed somewhere on a network where it can monitor traffic for a network segment or subnet