Network + 4.3 Network Security Features & Defense Techniques + 5.1 Network Troubleshooting Methodology

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

23 Terms

1
New cards

Device Hardening

Securing a device by reducing its attack surface.

2
New cards

Disable Unneeded Ports

Shuts down unused switchports to prevent unauthorized access.

3
New cards

Disable Unneeded Services

Removes unused services to reduce vulnerabilities.

4
New cards

Change Default Passwords

Prevents easy compromise using publicly known credentials.

5
New cards

Network Access Control (NAC)

Enforces security policies to allow only compliant devices onto the network.

6
New cards

Port Security

Limits allowed MAC addresses on a switch port.

7
New cards

802.1X Authentication

Port-based authentication using EAP before network access is granted.

8
New cards

MAC Filtering

Allows network access only to approved MAC addresses.

9
New cards

Key Management

Secure handling of cryptographic keys throughout their lifecycle.

10
New cards

Key Rotation

Regularly changing keys to reduce exposure.

11
New cards

Key Revocation

Invalidating compromised or unused cryptographic keys.

12
New cards

Security Rules

Policies controlling network traffic and resource access.

13
New cards

Access Control List (ACL)

Filters traffic based on IP, protocol, and port.

14
New cards

Uniform Resource Locator (URL) Filtering

Blocks or allows access based on website URLs.

15
New cards

Content Filtering

Inspects content to block malicious or inappropriate material.

16
New cards

Network Zones

Logical separation of network areas by trust level.

17
New cards

Trusted Zone

Secure internal network containing critical systems.

18
New cards

Untrusted Zone

External or public network with minimal trust.

19
New cards

Screened Subnet (DMZ)

Buffer network hosting public-facing services between trusted and untrusted zones.

20
New cards

What’s the Network Troubleshoot Methodology?

Identify the problem

Establish a Theory of Probable Cause

Test the Theory

Establish a Plan of Action

Implement the Solution

Verify Full Functionality & Prevent

Document Findings

21
New cards

Establish Theory of Cause

Form logical explanations based on gathered data

22
New cards

OSI Model Approach

Troubleshoot layer-by-layer, top-down or bottom-up.

23
New cards

Divide and Conquer

Isolate sections of the network to pinpoint the fault.