S+ Objective 1.2 Network Administration Principles Flashcards

Description

Flashcards covering Network Administration Principles defined in Objective 1.2
Tyler Hampton
Flashcards by Tyler Hampton, updated more than 1 year ago
Tyler Hampton
Created by Tyler Hampton almost 6 years ago
9
0

Resource summary

Question Answer
What do Firewall Rules do? Very similar to ACLs, and are used to dictate what traffic can pass between the firewall and the internal network.
What are VLANs used for? From a security perspective. VLANs segment a local network. This segmentation lets you hide segments of the network from other segments and thereby control access. VLANs can also control paths data takes from one point to another.
What are three basic things you can do to secure router configurations? Change the default password. Walk through the advanced settings. Keep the firmware upgraded.
What do Access Control Lists (ACLs) do? A table or data file (a list or entries) that specifies whether a user or group has access to a specific resource on a computer or network. Typically applied to routers.
What is Port Security? Security applied at OSI layer 2 to switch ports based on MAC addresses.
What does the 802.1x IEEE standard define? 802.1x defines port-based security for wireless network access control. It allows for access points and switches to rely on the authentication server for authentication rather than themselves.
What is a flood guard and where is it located in a network? A flood guard is built into a firewall that allows tweaks to be made to the tolerance of unanswered login attacks. Lessening the likelihood of DoS attacks.
What is layer 2 Loop Protection and what are the protocols that apply it? Loop protection keeps network broadcasts from being infinitely pushed around in a loop causing network performance degradation AKA a broadcast storm. Loop protection is applied using the Spanning Tree Protcol (STP) or the newer Rapid STP (RSTP)
Where does the Implicit Deny exist in network security and what is used for? The Implicit Deny belongs at the end of every ACL blocking any access that isn't specifically granted by the ACL.
What is the purpose of Log Analysis? The purpose of log analysis is to be able to create a standard baseline to measure future logs against to help determine errors and attacks.
Show full summary Hide full summary

Similar

Pe - Principles of Training
Beccadf 1
PRINCIPLES OF MARKETING
Greta Morrill
Kantian Deontological Ethics
James Hudson
Earth Systems
muraj012
How markets work defenitions
Jesse McNab
Ohm's Law Explained (Mod. 1 pt1)
That Yeti Dog Person
Computer Science mock revision cards
Lewis Annis
Basic Principles of Memory
Medicine94
Security+ High Availability Percentages
Lyndsay Badding
Principles of advertising Chapter 6-7
diarpot16
Security+ Cryptography
Lyndsay Badding