2.10 - CompTIA A+ Core 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

Changing default passwords

A security practice in SOHO networks to prevent attackers from guessing passwords based on default credentials.

2
New cards

IP Filtering

A feature that allows administrators to control traffic flow by specifying which IP addresses or FQDNs are permitted or denied access.

3
New cards

Firmware updates

Upgrades to the router's OS/software that typically contain bug fixes or security updates.

4
New cards

Content Filtering

A network feature that denies access to certain websites deemed insecure or inappropriate for work/parental controls.

5
New cards

Physical Placement/Secure Locations

The practice of installing networking equipment in areas safe from environmental threats and unauthorized access.

6
New cards

Universal Plug and Play (UPnP)

A feature that allows automatic configuration of routers by communicating with applications to facilitate access.

7
New cards

Screened Subnet

An isolated segment of a private network that can access the internet while protecting sensitive resources.

8
New cards

Management Access

Access to a SOHO router that must be tightly controlled with a complex password and, if possible, an additional authentication factor.

9
New cards

Service Set Identifier (SSID)

The unique name for a wireless network, used to distinguish it from others.

10
New cards

Disabling SSID Broadcast

Prevents the network name from being publicly broadcast, making it less visible to casual users.

11
New cards

Open System Encryption

Wi-Fi encryption that uses no password, common for public Wi-Fi networks.

12
New cards

WPA2/3-PSK

WPA2/3 encryption using a 256-bit pre-shared key for every connected device.

13
New cards

WPA2/3-802.1X

WPA2/3 encryption that utilizes a centralized authentication server.

14
New cards

Configuring Guest Access

Limiting guest network access to outsiders, primarily for IoT devices or lab networks.

15
New cards

Firewall Settings

Configured rules to block unauthorized access and monitor unusual traffic.

16
New cards

Disabling Unused Ports

A security practice that reduces vulnerabilities by limiting access points.

17
New cards

Port Forwarding

Redirects traffic to allow external devices access to services on a private network.