1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Unused ports and services are potential entry points for attackers, so disabling them removes unnecessary access paths into your system.
Disable Unused Ports & Services
Is the process of securing a device by reducing vulnerabilities—mainly by removing anything unnecessary that attackers could exploit.
Device Hardening
Default passwords are publicly known and easy for attackers to exploit, so changing them prevents unauthorized access.
Change Default Passwords
Ensures only authorized and authenticated devices or users can connect to the network. Includes 802.1X, which requires users or devices to authenticate before they are allowed network access.
Network Access Control (NAC)
_______ limits which devices can connect to a switch port by allowing only specific MAC addresses.
A: Assigning one seat to one person and blocking anyone else from sitting there.
Port Security
Allows or blocks devices based on their hardware (MAC) address, but it can be bypassed if attackers spoof addresses.
A: Letting people in only if their phone model matches a list.
MAC filtering
Is the centralized control of passwords, certificates, encryption keys, and credentials used across systems.
Key Management