Networking Authentication and Security Chapter 1

Card Set Information

Author:
jal128
ID:
294268
Filename:
Networking Authentication and Security Chapter 1
Updated:
2015-01-29 15:48:14
Tags:
networking cisco
Folders:

Description:
Networking Authentication and Security Chapter 1 Review Questions
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user jal128 on FreezingBlue Flashcards. What would you like to do?


  1. Device Hardening Definition
    Implement methods of physically securing the router
  2. Implement Device Hardening (6)
    • secure administrative access
    • maintain passwords
    • config enhanced virtual login features
    • implement secure shell (SSH)
    • Disable unused ports and interfaces
    • Disable unused services
  3. 3 Areas of Router Security
    • Physical
    • Router Hardening
    • Operating System Security
  4. Implement Physical Router Security (2)
    • Place physical devices in a secure locked area.
    • Install an uninterruptible power supply (UPS) and keep spare components available.
  5. Implement Operating System Security (3)
    • Configure router with max amount of memory possible
    • Keep OS up-to-date with the most stable version
    • Backup OS and config
  6. Ways to Secure Administrative Access to Routers (6)
    • Restrict device accessibility
    • Log and account for all access
    • Authenticate Access
    • Authorize Actions
    • Present legal notification
    • Ensure the confidentiality of data
  7. Remote Connection Precautions (3)
    • Encrypt all traffic
    • Establish a dedicated management network
    • Config a packet filter
  8. Increase Password Security
    • Min password length
    • Disable unattended connections
    • Encrypt all passwords in the config file
  9. Security for Virtual Login Connections (3)
    • Delays between successive login attempts
    • Login shutdown if DoS attacks are suspected
    • Generation of system logging messages for login detection
  10. SSH Port
    22
  11. SSH Setup Steps (5)
    • 1) change host name
    • 2) config domain name
    • 3) Generate one way secret keys
    • 4) Create a local database username entry
    • 5) Enable VTY inbound SSH sessions

What would you like to do?

Home > Flashcards > Print Preview