Module 13: End-point Security Flashcards

1
Q

What are 3 Traditional Host based security measures?

A

Antivirus Software
Host Based IPS
Host Based Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

New BYOD policies needs require what?

A

A different way of approaching end point security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 4 types of network based malware protection

A

Advanced Malware Protection
Email Security Appliance
Web Security Appliance
Network Admission Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What to do with local data

A

Locally encrypt the harddrive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What capabilities does a NAC (network access control) have

A

Profiling and Visibility
Guest Network Access
Security Posture Checking
Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the function of a NAC

A

To force the clients to query a authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is 802.1X?

A

is a network authentication protocol that opens ports for network access when an organisation authenticates a user’s identity and authorises them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is EAP?

A

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does EAP do?

A

allows a conversation between a Supplicant (the wireless/wired client) and the RADIUS (the authentication server), via an Authenticator (a wired switch or wireless access point which acts as a proxy).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Supplicant (Client)?

A

The device that request access to LAN and switch services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the authenticator (switch)?

A

the switch acts as a intermediary between the client and the authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the authentication server?

A

performs the actual authentication of the client. It validates the identity of the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Step 1 for 802.1x Config?

A

enable AAA using aaa new-model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Step 2 for 802.1x Config?

A

Designate the RADIUS server and configure its IP etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Step 3 for 802.1x Config?

A

Create an 802.1x port based authentication method list using the aaa authentication dot1x command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly