Created by Tyler Hampton
over 6 years ago
|
||
Question | Answer |
What do Firewall Rules do? | Very similar to ACLs, and are used to dictate what traffic can pass between the firewall and the internal network. |
What are VLANs used for? From a security perspective. | VLANs segment a local network. This segmentation lets you hide segments of the network from other segments and thereby control access. VLANs can also control paths data takes from one point to another. |
What are three basic things you can do to secure router configurations? | Change the default password. Walk through the advanced settings. Keep the firmware upgraded. |
What do Access Control Lists (ACLs) do? | A table or data file (a list or entries) that specifies whether a user or group has access to a specific resource on a computer or network. Typically applied to routers. |
What is Port Security? | Security applied at OSI layer 2 to switch ports based on MAC addresses. |
What does the 802.1x IEEE standard define? | 802.1x defines port-based security for wireless network access control. It allows for access points and switches to rely on the authentication server for authentication rather than themselves. |
What is a flood guard and where is it located in a network? | A flood guard is built into a firewall that allows tweaks to be made to the tolerance of unanswered login attacks. Lessening the likelihood of DoS attacks. |
What is layer 2 Loop Protection and what are the protocols that apply it? | Loop protection keeps network broadcasts from being infinitely pushed around in a loop causing network performance degradation AKA a broadcast storm. Loop protection is applied using the Spanning Tree Protcol (STP) or the newer Rapid STP (RSTP) |
Where does the Implicit Deny exist in network security and what is used for? | The Implicit Deny belongs at the end of every ACL blocking any access that isn't specifically granted by the ACL. |
What is the purpose of Log Analysis? | The purpose of log analysis is to be able to create a standard baseline to measure future logs against to help determine errors and attacks. |
Want to create your own Flashcards for free with GoConqr? Learn more.