4.6 Flashcards

1
Q

What is IPS signature management used for?

A

The intrusion prevention system(IPS) compares traffic against signatures of known threats and blocks traffic when a threat is detected and decided to block, allow or send an alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Device hardening used for?

A

No system is secure with the default configurations so we need some guidelines to keep everything safe but these guidelines are specific to software and platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why changing native VLAN is important?

A

Native VLANs are when we are trunking multiple different switches together and it’s not the same as the default VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whats a privileged account?

A

It’s an account with elevated access to one or more systems, but it needs to be highly secured(secured password and changing it often)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats FIM?

A

(File Integrity Monitoring) It’s monitoring important operating system and application files(these files should never change).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do we restrict access via ACLs?

A

We use the device ACLs to limit access to important infrastructure devices. These are ACLs being setup on a router and they are different than the ACLs for application access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are honeypots?

A

These are used to attract the bad guys and trap them. Honeypots can be a single device or a network of honeypots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why do we do penetration testing?

A

We Pentest by simulating an attack to find the vulnerability. In some companies it’s often a compliance mandate to do a regular penetration testing by 3rd-party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do we create a loop in network?

A

By connecting two switches to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can we stop a loop?

A

By blocking the correct interface(physical port).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whats BPDU guard?

A

(Bridge Protocol Data Unit)
One of the challenges with spanning tree is that it may take some time for this network convergence to occur. On some switches, you have the option to bypass that entire process. This is called BPDU guard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whats root guard?

A

It allows you to pick the root but spanning tree determines the root bridge and uses the lowest MAC address device first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whats flood guard?

A

It’s configuring the maximum number of source MAC addresses on an interface. The switch monitors the number of unique MAC addresses and once you exceed the maximum, port security activates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Whats DHCP snooping?

A

It’s an IP tracking on a layer 2 device in a switch. Switch watches for DHCP conversations and adds a list of untrusted devices to a table and filters invalid IP and DHCP information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Whats is network segmenting mean?

A

It’s segmentation in physical, logical or virtual which helps with performance and security or to take care of compliance issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are VLANs?

A

(Virtual Local Area Networks)It’s used for Separating logically instead of physically in a switch but two allows different VLANs communicate with each other, we will need a layer 3 device(router).

17
Q

Whats DMZ?

A

(Demilitarized Zone) It’s an additional layer of security between the internet and you.