4.0 Network Security Flashcards Preview

Network+ N10-007 > 4.0 Network Security > Flashcards

Flashcards in 4.0 Network Security Deck (36)
Loading flashcards...
1

what would you configure on a switch to segment traffic?

VLAN

2

what is the purpose of a network scan?

to gather information about hosts within a network

3

what is the purpose of banner grabbing?

to gain information about remote systems

4

what is the purpose of the spanning tree protocol?

prevents broadcast storms caused by two ports on a switch being connected to each other

5

what device uses an ACL to filter traffic

Firewall

6

where is IP filtering configured?

ACL in a firewall

7

what type of filter allows SMTP traffic through a firewall?

port filter (blocking TCP port 25)

8

what would you manipulate to block access to a network for a specific computer?

Firewall's ACL

9

what is the name of bogus server with false data designed to lure attackers?

Honeypot

10

what technique is commonly done to identify open ports on a server?

port scanning

11

what is the general purpose of disabling unnecessary services on a server?

to harden the server

hardening a device makes it more secure than the default configuration

12

where should updates for production servers be applied first?

to a test server that mimics the production server

13

an attacker creates an evil twin and then collects data from anyone that connects to it. what type of attack is this?

MITM attack

14

an attacker connects to a switch and is then able to connect to existing VLANs on the same switch. what type of attack is this?

VLAN hopping

15

what kind of threat is possible from a disgruntled employee?

an insider threat

16

what type of attack is launched from a single host against a single host?

DoS attack

17

what is the name of an unauthorized wireless network with a different name than a legitimate wireless network?

Rogue access point

18

what type of attack floods a switch with traffic, with the goal of redirecting traffic to an attacker's computer?

ARP poisoning

19

an attacker impersonates a service technician to gain access to a building. What is this called?

Social engineering

20

what type of attack is launched from several hosts against a single host?

DDoS attack

21

what is the name of a malicious wireless network with the same name as a legitimate wireless network?

Evil twin

22

what type of filtering on a router can restrict access based on a hardware address?

MAC filtering

23

what information is required by a user to access a WPA2 protected network?

Passphrase or pre-shared key

24

what is the strongest encryption wireless protocol (listed in the CompTIA objectives)?

WPA2

25

what does EAP provide?

A framework for authentication and authorization

EAP (extensible authentication protocol)

26

what type of encryption does WPA2-PSK use?

CCMP-AES

27

what can be used on a network to restrict access based on hardware address?

MAC filtering

28

wireless guests are redirected to a page requiring them to enter credentials before they can access the internet. What is this called?

A captive portal

29

what is syslog?

a message-logging standard

a syslog server is a centralized server that can collect logs from multiple devices

30

users must log in with a smart card, a PIN, and a password. what kind of authentication is this?

Dual-factor authentication

It is sometimes called multi-factor authentication, but it only used two types of authentication - something you have (smart card) and something you know (PIN and password)