Flashcards in 4.0 Network Security Deck (36)
what would you configure on a switch to segment traffic?
what is the purpose of a network scan?
to gather information about hosts within a network
what is the purpose of banner grabbing?
to gain information about remote systems
what is the purpose of the spanning tree protocol?
prevents broadcast storms caused by two ports on a switch being connected to each other
what device uses an ACL to filter traffic
where is IP filtering configured?
ACL in a firewall
what type of filter allows SMTP traffic through a firewall?
port filter (blocking TCP port 25)
what would you manipulate to block access to a network for a specific computer?
what is the name of bogus server with false data designed to lure attackers?
what technique is commonly done to identify open ports on a server?
what is the general purpose of disabling unnecessary services on a server?
to harden the server
hardening a device makes it more secure than the default configuration
where should updates for production servers be applied first?
to a test server that mimics the production server
an attacker creates an evil twin and then collects data from anyone that connects to it. what type of attack is this?
an attacker connects to a switch and is then able to connect to existing VLANs on the same switch. what type of attack is this?
what kind of threat is possible from a disgruntled employee?
an insider threat
what type of attack is launched from a single host against a single host?
what is the name of an unauthorized wireless network with a different name than a legitimate wireless network?
Rogue access point
what type of attack floods a switch with traffic, with the goal of redirecting traffic to an attacker's computer?
an attacker impersonates a service technician to gain access to a building. What is this called?
what type of attack is launched from several hosts against a single host?
what is the name of a malicious wireless network with the same name as a legitimate wireless network?
what type of filtering on a router can restrict access based on a hardware address?
what information is required by a user to access a WPA2 protected network?
Passphrase or pre-shared key
what is the strongest encryption wireless protocol (listed in the CompTIA objectives)?
what does EAP provide?
A framework for authentication and authorization
EAP (extensible authentication protocol)
what type of encryption does WPA2-PSK use?
what can be used on a network to restrict access based on hardware address?
wireless guests are redirected to a page requiring them to enter credentials before they can access the internet. What is this called?
A captive portal
what is syslog?
a message-logging standard
a syslog server is a centralized server that can collect logs from multiple devices