Network Hardening Flashcards

1
Q

securp snmp

A

simple network management protocol
monitors and controls servers switches routers firewalls and other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

which snmp versions have encrypted network traffic

A

snmpV3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Hardening technique focusing on router advertisements sent with IPv6
A

Router Advertisement (RA) guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Prevent unauthorized users from connecting to a switch interface
  • Will alert or disable the port
A

Port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port security operation

A

Configure the max number of source MAC addresses on an interface

  • Can also configure specific MAC addresses
  • The switch monitors the number of unique MAC address and maintains a list of every source MAC address
  • Once you exceed the maximum, port security activates and will disable the port or send an alert to the administrator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security feature on a switch that monitors ARP messages in order to detect faked ARP messages

A

Dynamic ARP Inspection (DAI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does DAI work?

A

DAI tracks trusted IP to MAC bindings (using DHCP Snooping database).

  • DAI has “Trusted” and “Untrusted” ports.
  • Trusted ports aren’t checked, Untrusted ports are verified that they have an approved MAC.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Control Plane Policing (CoPP)

A

A policy applied to the control plane of a router to protect the CPU from high rates of traffic that could impact router stability.

  • Protects against denial of service or reconnaissance
  • Can also block any non-management traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the management (control) plane?

A

Used for access and management of network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the data plane?

A

A conceptual component of a network device that performs the actual operation over data flows. Eg. Packet forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

restrict access between interfaces
even on the same Vlan

A

port isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A security technique to turn off ports on a network device that are not required or currently in use

A

Disabling unused interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A form of network access control that makes someone authenticate regardless of connection type to a when connecting to a network

A

802.1X Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Every port is a possible entry port
  • Close everything except required ports
  • Can be controlled with a firewall - NGFW would be ideal
  • Disable or filter any unused services from any network communication
  • Use Nmap or similar port scanner to verify which ports are being used by your applications
A

Disable unnecessary ports and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Most devices have default usernames and passwords
  • Make sure to change them!
  • The right credentials provide full control - Admin access
A

Changing default credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Don’t want users on the same VLAN that’s used by management traffic
  • Have separate VLAN just for that traffic
A

Change default VLAN

17
Q
  • A security feature on switches whereby DHCP messages on the network are checked and filtered
  • The switch inspects DHCP traffic to ensure the host is not trying to spoof its MAC address
  • Can be used to prevent rogue DHCP servers from operating on the network
A

DHCP snooping

18
Q

The process of regularly applying patches and updates to software

A

Patch management

19
Q
  • Access is based on the role a person plays in an organization
  • Allows unrestricted access and if the credentials for this account are shared, risk of compromise is greatly magnified
A

Role-based access

20
Q
  • List of permissions associated with a system resource
  • Specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects
  • Each entry in specifies a subject and an operation
A

Access Control List (ACL

21
Q
  • A set of individual instructions to control the actions of a firewall
  • Most include implicit deny - If there’s no explicit rule in the rule list, the traffic is blocked
A

Firewall rules

22
Q
  • Limit access through the physical hardware address
  • Additional administration required for configuring which MAC addresses are allowed
  • Will have to add new allowed addresses for visitors and new people on the network
  • Security through obsurity
A

MAC filtering

23
Q

Authentication framework frequently used in wireless networks which supports multiple authentication methods w/o having to pre-negotiate a particular one

A

EAP (Extensible Authentication Protocol)

24
Q
  • The use of GPS or RFID technology to create a virtual geographic boundary, enabling software to trigger a response when a mobile device enters or leaves a particular area, such as deny or allow
  • Example - Disabling the camera on a mobile device when it enters a building where you don’t want someone taking pictures
A

Geofencing

25
Q
  • Web page accessed with a browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources
  • Only allows HTTP traffic and redirects the HTTP traffic to a remediation server
A

Captive portal