Network Security 4.3

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards

Unused ports and services are potential entry points for attackers, so disabling them removes unnecessary access paths into your system.

Disable Unused Ports & Services

2
New cards

Is the process of securing a device by reducing vulnerabilities—mainly by removing anything unnecessary that attackers could exploit.

Device Hardening

3
New cards

Default passwords are publicly known and easy for attackers to exploit, so changing them prevents unauthorized access.

Change Default Passwords

4
New cards

Ensures only authorized and authenticated devices or users can connect to the network. Includes 802.1X, which requires users or devices to authenticate before they are allowed network access.

Network Access Control (NAC)

5
New cards

_______ limits which devices can connect to a switch port by allowing only specific MAC addresses.

A: Assigning one seat to one person and blocking anyone else from sitting there.

Port Security

6
New cards

Allows or blocks devices based on their hardware (MAC) address, but it can be bypassed if attackers spoof addresses.

A: Letting people in only if their phone model matches a list.

MAC filtering

7
New cards

Is the centralized control of passwords, certificates, encryption keys, and credentials used across systems.

Key Management