Comptia core 2 2.9 Scenario, configure appropriate security settings on small office/home office (SOHO) Wireless and wired networks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

change default passwords

Routers and modems come with default usernames and passwords, these are usually "admin" and "password", or in some cases "admin" and "admin". Make sure to change it so that unauthorized users do not have the ability to access the routers or modems.

2
New cards

IP filtering

IP filtering can control which devices are allowed to connect to a network based on their IP address. The user can create an access control list (ACL) to permit or deny traffic from specific IP addresses or ranges.

3
New cards

Firmware updates

Regularly updates to the firmware of the routers, switches, and other network devices to patch security vulnerabilities and improve performance.
Enable automatic firmware updates, if possible, or regularly check for updates manually.

4
New cards

Content filtering

Use content filtering to block access to malicious websites, inappropriate content, or specific categories of websites (Like gambling or adult content). This can help prevent users from inadvertently accessing harmful or distracting content.

5
New cards

Physical placement/secure locations

The user should place their networking equipment in secure locations to prevent unauthorized access. For example, keep routers and switches in locked cabinets or rooms to prevent physical tampering or theft.

6
New cards

Dynamic host configuration protocol (DHCP) reservations

Assign static IP addresses to specific devices on the users network using DHCP reservations. Ensures that critical devices always receive the same IP address, making them easier to manage and allows specific security rules to be applied to them.

7
New cards

Static wide-area network (WAN) IP

If the user's network uses a static WAN IP address, ensure that it is properly configured and protected.
Make sure to regularly monitor for any unauthorized changes to the WAN IP address or settings.

8
New cards

Universal plug and play (UPnP)

Keep UPnP disabled unless absolutely necessary. UPnP can introduce security vulnerabilities by automatically configuring port forwarding and opening firewall ports without user intervention.
Manually configure port forwarding rules instead, if needed, to ensure better control over network access.

9
New cards

Screened subnet

Implement a screened subnet architecture to separate your internal network from external threats. This can be achieved by using a firewall or router with multiple interfaces to create a demilitarized zone (DMZ) where public-facing servers or services are located, while keeping internal resources protected behind another layer of security.

10
New cards

Changing the service set identifier (SSID)

The user should change the default SSID of the wireless network to a unique name that does not reveal any personal information. Avoid using easily guessable names or anything that identifies business or location.

11
New cards

Disabling SSID broadcast

The user should disable the broadcasting of their SSID to prevent it from being easily discovered by unauthorized users.
This doesn't completely hide the network, but it adds another layer of obscurity and may deter casual attackers.

12
New cards

Encryption settings

The users should enable strong encryption protocols such as WPA2 (wifi protected access 2) or, ideally, WPA3 if it is supported by their devices. Use a strong passphrase or network key that is difficult to guess.
Avoid using outdated encryption standards like WEP (wired equivalent privacy) as they are vulnerable to attacks.

13
New cards

Disabling guest access

If the user does not require guest access to their network, they should disable this feature on the router.
Guest networks pose security risks if not properly configured and monitored.

14
New cards

Changing channels

The user should adjust the wireless channel settings on their router to minimize interference from neighboring networks.
Tools like WiFi analyzers to identify the least congested channels in the users area and switch to them for optimal performance and reduced interference.

15
New cards

Disabling unused ports

If the users wireless router has ethernet ports, disable the ports that are not in use to prevent unauthorized access through wired connections,

16
New cards

Port forwarding/mapping

This should only be enabled for services that require external access, like a web server or remote desktop application.
Avoid forwarding unnecessary ports as they can expose your network to potential security risks. Regularly review and update your port forwarding rules to ensure they are still necessary and secure.