Network Hardening Flashcards

1
Q

Hardening

A

Securing a system by reducing its surface of vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Patch Management

A

Involves planning, testing, implementing, and auditing of software patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Four steps for patch management

A

Planning, Testing, Implementing/Implementation, Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Service

A

Application that runs in the background, like a print spooler; disable the ones that are not needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Least Functionality

A

Process of configuring a device, a server, or a workstation to only provide essential services required by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Port Security

A

Prevents unauthorized access to a switchport by identifying and limiting the MAC addresses of the hosts that are allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Private VLAN (port isolation)

A

A technique where a VLAN contains switchports that are restricted to using a single uplink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dynamic ARP Inspection (DAI)

A

Validates the Address Resolution Protocol packets in your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DHCP Snooping

A

Provides security by inspecting DHCP traffic, filtering untrusted DHCP messages, and building and maintaining a DHCP snooping binding table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPv6 Router Advertisement Guard

A

Mitigates attack vectors based on IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Control Plane Policing (CPP)

A

Configures a Qos filter that manages the traffic flow of control plane packets to protect the control plane of Cisco IOS routers and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SNMP

A

Allows us to easily gather info from our various network devices back to a centralized management server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access Control List (ACL)

A

A list of permissions associated with a given system or network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless Client Isolation

A

Prevents wireless clients from communicating with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Guest Network Isolation

A

Keeps guests away from your internal network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pre-Shared Key (PSK)

A

Secures wireless networks, including those protected WEP, WPA, WPA2, and WPA3

17
Q

Extensible Authentication Protocol (EAP)

A

Acts as a framework and transport for other authentication protocols