4.5 Flashcards

1
Q

Why do we change the default credentials?

A

Because most devices have default usernames and passwords and it’s very easy to find the defaults for your WAP or router. So for security purposes we need to change them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is it important to avoid common passwords?

A

Since most of the people use common words as passwords, brute force attackers start with the easy ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do we upgrade firmware?

A

Many network devices do not use traditional operation system in which the potential exists for security vulnerabilities. So to plan for the unexpected we need to have our firmware up-to-date at all times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is patch management important?

A

Because of system stability and security fixes we need to get all the update patches or if there is a service pack available, we need to get it asap and look for monthly updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats file hashing?

A

Hashing represents data as a short string of text which has a unique value and it allows us to verify the integrity of a downloaded file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why do we disable unnecessary services?

A

Every service has the potential for trouble but “Unnecessary” isn’t always obvious and might require a lot of research like trial and error(testing and monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the secure protocols we should use?

A
  1. SSH(instead of Telnet:terminal sessions)
  2. SFTP(instead of FTP: file transfer)
  3. SNMPv3(instead of SNMPv1 and SNMPv2:encrypted communication)
  4. TLS/SSL(HTTP inside of TLS is HTTPS)
  5. IPsec(Encrypt at the IP packet level)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is generating new keys is important?

A

We communicate to network devices over encrypted channels and encryption keys are usually managed on the devices. Therefore anyone with the key can potentially decrypt administrative sessions. That’s why updating or changing they keys during the installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why do we disable unused IP ports?

A

To control traffic based on data within the content we use a firewall to allow or restrict port numbers(TCP and UDP filtering).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do we disable unused ports(interfaces)?

A

We administratively disable unused ports to maintain and secure the port and sometimes add NAC(Network Access Control) so users have to authenticate to be able to communicate,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly