2101 Ch16: Network Security Fundamentals Quiz
25 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What should be done immediately after installing a new OS on a device for better security?

  • Set the firewall to the lowest security level
  • Install as many applications as possible
  • Change default usernames and passwords (correct)
  • Allow all default settings to remain unchanged
  • Which of the following is a recommended practice for securing passwords?

  • Share passwords with colleagues
  • Encrypt plaintext passwords (correct)
  • Use short and simple passwords
  • Always write passwords down
  • What is the role of the Cisco AutoSecure feature?

  • To provide wireless network security
  • To automatically install applications
  • To assist in securing Cisco routers (correct)
  • To manage user permissions
  • How can network access control enhance endpoint security?

    <p>By restricting access to authorized users only</p> Signup and view all the answers

    What should be done to reduce the risk of brute-force password guessing attacks?

    <p>Set a minimum acceptable password length</p> Signup and view all the answers

    What should be done with unnecessary services and applications on a device?

    <p>They should be turned off and uninstalled when possible</p> Signup and view all the answers

    What is an important step to take to support SSH on routers and switches?

    <p>Configure appropriate devices</p> Signup and view all the answers

    What technique allows or denies access based on IP or MAC addresses?

    <p>Packet filtering</p> Signup and view all the answers

    Which method prevents or allows access based on specific application types?

    <p>Application filtering</p> Signup and view all the answers

    What type of filtering makes decisions based on specific URLs or keywords?

    <p>URL filtering</p> Signup and view all the answers

    Which technique requires incoming packets to be legitimate responses to internal requests?

    <p>Stateful packet inspection</p> Signup and view all the answers

    What is considered one of the greatest challenges in securing endpoint devices?

    <p>Involvement of human nature</p> Signup and view all the answers

    What should a company implement to help secure endpoint devices effectively?

    <p>Well-documented policies</p> Signup and view all the answers

    What is a common security policy that companies should enforce on endpoint devices?

    <p>Use of antivirus software</p> Signup and view all the answers

    Which aspect is crucial for employees regarding network use?

    <p>Understanding security policies</p> Signup and view all the answers

    What essential capability can stateful packet inspection include?

    <p>Recognition of specific attacks</p> Signup and view all the answers

    What is a recommended minimum password length for network security?

    <p>8 characters</p> Signup and view all the answers

    Which of the following is a characteristic of a strong password?

    <p>A mix of uppercase and lowercase letters, numbers, and symbols</p> Signup and view all the answers

    What is a key advantage of using a passphrase for a password?

    <p>It is often easier to remember and harder to guess</p> Signup and view all the answers

    What is the purpose of the service password-encryption command in Cisco devices?

    <p>To encrypt plaintext passwords in the configuration file</p> Signup and view all the answers

    What strategy can be used to deter brute-force password guessing attacks?

    <p>Setting a minimum password length</p> Signup and view all the answers

    Why should users avoid using identifiable personal information in their passwords?

    <p>It can be easily guessed or obtained by attackers</p> Signup and view all the answers

    What is one way to ensure passwords remain secret on network devices?

    <p>Encrypt all plaintext passwords</p> Signup and view all the answers

    How often should passwords ideally be changed to enhance security?

    <p>Every few months</p> Signup and view all the answers

    What can be included in a strong password to improve its complexity?

    <p>A mix of letters, numbers, symbols, and spaces</p> Signup and view all the answers

    Study Notes

    Network Security Fundamentals

    • Network security is crucial for protection from threat actors
    • Opening all doors and windows is like having unsecured network
    • Individuals and organizations depend on computer networks
    • Network intrusions can lead to costly outages and data loss
    • Threat actors gain access through software vulnerabilities, hardware attacks or guessed passwords

    Types of Threats

    • Information theft: Gaining confidential information (e.g., research data)
    • Data loss/manipulation: Destroying or altering data records (e.g., reformatting disks)
    • Identity theft: Stealing personal information for fraudulent purposes
    • Disruption of service: Preventing legitimate use of services (e.g., denial of service attacks)

    Types of Vulnerabilities

    • Technological: Weaknesses in the technology itself
    • Configuration: Weaknesses due to how a system is configured
    • Security policy: Weaknesses in the policies outlining how a system functions

    Physical Security

    • Hardware threats: Physical damage to devices
    • Environmental threats: Extreme temperatures or humidity
    • Electrical threats: Voltage spikes, insufficient/total power loss
    • Maintenance threats: Poor handling of equipment, lack of parts, poor cabling
    • Security protocols to limit damage

    Malware

    • Viruses: Copy themselves into other programs causing varying levels of damage
    • Worms: Standalone software that replicates themselves and cause harm similar to viruses
    • Trojan Horses: Seem legitimate but cause harm to a host/system (e.g., by deleting files or stealing data)

    Network Attacks

    • Recononnaissance attacks: Identify systems, services, or vulnerabilities
    • Access attacks: Unauthorized manipulation of data, system access or user privileges
    • Denial of service attacks: Disrupting or corrupting services

    Trust Exploitation

    • Port redirection: Using a compromised system to attack other targets
    • Man-in-the-middle attacks: Intercepting data between two legitimate entities. Steps:1.Victim requests page 2.Threat actor gets page 3.Threat actor modifies page 4.Threat actor sends page to victim

    Denial of Service Attacks

    • DoS attacks: Attack that attempts to make a machine or network resource unavailable
    • DDoS attacks: A distributed denial-of-service (DDoS) attack is a type of DoS attack where multiple compromised systems are used to target a single victim to make the target unavailable. 

    Mitigation

    • Secure all devices (routers, switches, servers, hosts)
    • Employ updated data backups, including network device configurations as appropriate
    • Implement security systems like Firewalls, Intrusion Prevention Systems (IPS), Email Security Appliances (ESAs), AAA/authentication authorization/accounting servers, to prevent attacks
    • Monitor devices for threats
    • Regularly update software
    • Comply with security policies

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers essential concepts of network security, including types of threats, vulnerabilities, and the importance of protecting networks from intrusions. Test your knowledge on how to safeguard information and ensure secure configurations to prevent data loss and identity theft.

    Use Quizgecko on...
    Browser
    Browser