Network Hardening (4.3) Flashcards

(41 cards)

1
Q

Hardening

A

o Securing a system by reducing its surface of vulnerabilities
o Healthy balance between operations and security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Patch Management

A

o Involves planning, testing, implementing, and auditing of software patches
▪ Provides security
▪ Increases uptime
▪ Ensures compliance
▪ Improves features
o Ensure patches don’t create new problems once installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Planning

A

● Tracks available patches and updates and determines how to test
and deploy each patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Testing

A

● Tests any patch received from a manufacturer prior to automating
its deployment through the network
● Have a small test network, lab, or machine for testing new patches before deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Implementing/ Implementation

A

● Deploys the patch to all of the workstations and servers that
require it
● Disable the Windows Update service from running automatically
on the workstation
● Also implement patching through a mobile device manager
(MDM), if needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Auditing

A

● Scans the network and determines if the patch was installed
properly and if there are any unexpected failures that may have
occurred
● Also conduct firmware management for your network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password Policy

A

▪ Specifies minimum password length, complexity, periodic changes, and
limits on password reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Strong Password

A

▪ Sufficiently long and complex which creates lots of possible combinations
for brute force attacks to be completed in time
● Long vs Complex
● Passwords should be up to 64 ASCII characters long
● Password aging policies should not be enforced
● Change default passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unneeded Services

A

o A service is an application that runs in the background of an operating system or
device to perform a specific function
▪ Disable any services that are not needed for business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Least Functionality

A

▪ Process of configuring a device, a server, or a workstation to only provide
essential services required by the user
● AutoSecure CLI command can be used on Cisco devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port Security

A

▪ Prevents unauthorized access to a switchport by identifying and limiting
the MAC addresses of the hosts that are allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Static Configuration

A

▪ Allows an administrator to define the static MAC addresses to use on a
given switchport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dynamic Learning

A

▪ Defines a maximum number of MAC addresses for a port and blocks new
devices that are not on the learned list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Private VLAN (Port Isolation)

A
▪ A technique where a VLAN contains switchports that are restricted to
using a single uplink
● Primary
● Secondary isolated
● Secondary community
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Primary VLAN

A

▪ Forwards frames downstream to all of the secondary VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Isolated VLAN

A

▪ Includes switchports that can reach the primary VLAN but not other
secondary VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Community VLAN

A

▪ Includes switchports that can communicate with each other and the
primary VLAN but not other secondary VLANs

18
Q

Promiscuous Port (P-Port)

A
o Can communicate with anything connected to the primary
or secondary VLANs
▪ Host Ports
▪ Isolated Ports (I-Port)
▪ Community Ports (C-Port) df
19
Q

Isolated Port (I-Port)

A

o Can communicate upwards to a P-Port and cannot talk

with other I-Ports

20
Q

Community Port (C-Port)

A

o Can communicate with P-Ports and other C-Ports on the
same community VLAN
▪ Default VLAN is known as VLAN 1

21
Q

Native VLAN

A

▪ VLAN where untagged traffic is put once it is received on a trunk port

22
Q

Dynamic ARP Inspection (DAI)

A

▪ Validates the Address Resolution Protocol (ARP) packets in your network
▪ Ensures only valid ARP requests and responses are relayed across the
network device
▪ Invalid ARP packets are dropped and not forwarded

23
Q

DHCP Snooping

A

▪ Provides security by inspecting DHCP traffic, filtering untrusted DHCP
messages, and building and maintaining a DHCP snooping binding table

24
Q

Untrusted Interface

A

▪ Any interface that is configured to receive messages from outside the
network or firewall

25
Trusted Interface
▪ Any interface that is configured to receive messages only from within the network ▪ Configure switches and VLANs to allow DHCP snooping
26
IPv6 Router Advertisement Guard (RA-Guard)
▪ Mitigates attack vectors based on forged ICMPv6 router advertisement messages ▪ Operates at Layer 2 of the OSI model for IPv6 networks to specify which interfaces are not allows to have router advertisements on
27
Control Plane Policing (CPP)
▪ Configures a QoS filter that manages the traffic flow of control plane packets to protect the control plane of Cisco IOS routers and switches ● Data plane ● Management plane ● Control plane ● Service plane
28
Control Plane Policing (CPP)
▪ Configures a QoS filter that manages the traffic flow of control plane packets to protect the control plane of Cisco IOS routers and switches
29
SNMP
▪ Allows us to easily gather information from our various network devices back to a centralized management server ▪ Community strings grant access to portions of the device management planes ● Ensure you are NOT using SNMP v1 or SNMP v2 o SNMP v3 uses encoded parameters to provide its authentication as a part of the SNMP architecture ● Combine with whitelisting of the Management Information Base (MIB) ● Use authPriv on your devices ● Ensure all SNMP administrative credentials have strong passwords ● Follow the principles of least privilege o Role separation between polling/receiving traps (for reading) ● Configuring users or groups (for writing) ● Apply and extend access control lists to block unauthorized access ● Keep system images and software up-to-date ● Segregate SNMP traffic onto a separate management network
30
Access Control List (ACL)
o A list of permissions associated with a given system or network resource ▪ Block SSH for a single computer based on its IP address ▪ Block any IP using port 110 ▪ Block any IP and any port from outside the LAN ▪ Block incoming requests from private loopback and multicast IP ranges ▪ Block incoming requests from protocols that should only be used locally ▪ Block all IPv6 traffic or allow it to only authorized hosts and ports
31
Explicit Deny
▪ Blocks matching traffic
32
Implicit Deny
▪ Blocks traffic to anything not explicitly specified
33
Role-Based Access
▪ Defines the privileges and responsibilities of administrative users who control firewalls and their ACLs
34
MAC Filtering
▪ Defines a list of devices and only allows those on your Wi-Fi network ● Explicit allow ● Implicit allow ● Always use explicit allow ● Don’t rely on it as your only wireless network protection
35
Wireless Client Isolation
▪ Prevents wireless clients from communicating with one another ▪ Wireless access points begin to operate like a switch using private VLANs
36
Guest Network Isolation
▪ Keeps guests away from your internal network communications
37
Pre-Shared Key (PSK)
▪ Secures wireless networks, including those protected with WEP, WPA, WPA2, and WPA3 ▪ Ensure you choose a long and strong password
38
Extensible Authentication Protocol (EAP)
▪ Acts as a framework and transport for other authentication protocols
39
Geofencing
▪ A virtual fence created within a certain location
40
Captive Portal
▪ A web page displayed to newly connected Wi-Fi users before being granted broader access to network resources
41
IoT Considerations
``` o Understand your endpoints o Track and manage your devices o Patch vulnerabilities o Conduct test and evaluation o Change defaults credentials o Use encryption protocols o Segment IoT devices ```