Chapter 4 - section 4.3 - Given a scenario, apply network security features, defense techniques, and solutions

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

section 4.3

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards
Objective – Network Security Hardening
• Device hardening
▸ Disable unused ports and services
▸ Change default passwords
• Network access control (NAC)
▸ Port security
▸ 802.1X
▸ MAC filtering
• Key management
• Security rules
▸ Access control list (ACL)
▸ Uniform Resource Locator (URL) filtering
▸ Content filtering
• Zones
▸ Trusted vs. untrusted
▸ Screened subnet
2
New cards
Device Hardening
• Process of securing network devices
• Reduces attack surface
• Applies to routers, switches, servers, firewalls
• Core security best practice (exam critical)
3
New cards
Disable Unused Ports and Services
• Shuts down unnecessary interfaces
• Prevents unauthorized access
• Reduces vulnerabilities
• Common switch hardening step
4
New cards
Change Default Passwords
• Default credentials are publicly known
• High risk if unchanged
• Applies to all network devices
• Exam tip: first hardening step
5
New cards
Network Access Control (NAC)
• Controls who can access the network
• Enforces security policies
• Can restrict devices and users
• Often integrated with authentication systems
6
New cards
Port Security
• Switch feature limiting MAC addresses per port
• Prevents unauthorized devices
• Protects against MAC flooding
• Layer 2 security control
7
New cards
802.1X
• Port-based network access control
• Requires authentication before access
• Uses RADIUS server
• Common in enterprise networks (exam critical)
8
New cards
MAC Filtering
• Allows or blocks devices by MAC address
• Simple but not very secure
• MAC addresses can be spoofed
• Often used in small networks
9
New cards
Key Management
• Secure handling of encryption keys
• Includes generation, storage, rotation
• Prevents unauthorized decryption
• Important for encrypted communications
10
New cards
Security Rules
• Define what traffic is allowed or denied
• Implemented on firewalls and routers
• Enforce organizational security policies
11
New cards
Access Control List (ACL)
• Rule set controlling network traffic
• Based on IP, protocol, port
• Can be permit or deny
• Stateless filtering method
12
New cards
URL Filtering
• Blocks access to specific websites
• Based on URL or domain
• Used for security and productivity
• Common on firewalls and proxies
13
New cards
Content Filtering
• Controls types of content allowed
• Blocks malware, adult, or unsafe content
• Often used with URL filtering
• Policy-based control
14
New cards
Security Zones
• Logical separation of network areas
• Controls trust levels
• Limits attack spread
• Exam critical concept
15
New cards
Trusted vs. Untrusted Zones
• Trusted: internal, secure network
• Untrusted: external networks (internet)
• Traffic between zones is filtered
• Firewall-enforced separation
16
New cards
Screened Subnet
• Also known as DMZ
• Isolated network segment
• Hosts public-facing services
• Protects internal trusted network
17
New cards

sample question

• Q: Which security practice reduces the attack surface of a network device?

▸ A: Device hardening

• Q: What switch feature limits the number of MAC addresses per port?

▸ A: Port security

• Q: Which protocol provides port-based authentication using a RADIUS server?

▸ A: 802.1X

• Q: Why is MAC filtering considered weak security?

▸ A: MAC addresses can be spoofed

• Q: Which security control filters traffic based on IP address and port?

▸ A: Access Control List (ACL)

• Q: What security zone is also known as a DMZ?

▸ A: Screened subnet

• Q: What is the first recommended step when securing a new network device?

▸ A: Change default passwords