To _______ _______ and access to a system you can limit privileges (especially admin privileges), change default passwords, require password to be complex, require multi-factor authentication, and use biometric or one-time password devices.
Control Login
The command used to see the installed RPM packages on the computer system.
yum
yum list installed
A tunnel between 2 endpoints - usually with the purpose of encrypting information between them.
VPN - Virtual Private Network
Define NAT
Network Address Translation
The 8 Steps of creating a Manageable Network Plan according to the NSA.
1. Prepare to Document
2. Map Your Network
3. Protect Your Network: Network Architecture
4. Reach Your Network: Device Accessibility
5. Control Your Network: User Access
6. Manage Your Network Part 1: Patch Management
7. Manage Your Network Part 2: Baseline Management
8. Document Your Network
1. This is a set of consistent requirements that a host device SHOULD meet before being allowed onto your network.
2. The set of consistent requirements that a host device MUST meet before being allowed onto your network is this other type.
1. Configuration Baseline
2. Security Baseline
The command line utility used to provide information about the network architecture and layout.
nmap
A device that connects physical ports using logical port numbers (that could potentially be changed) to each other.
Router
Name the 3 general VPN protocols.
Carrier Protocol (such as IP)
Tunneling Protocol (such as PPTP or L2TP)
Passenger Protocol (for data being transmitted)
The buffer network or subnet that is between the private network and the open Internet.
DMZ - Demilitarized Zone
_______ _______ is the activities and process involved in applying a hotfix, patch, or Service Pack.
Patch Management
Command used to check for sockets that are currently open on your sysetm.
netstat
-a / -l / -s / -i
-l is a lowercase "L" and is not the "pipe"
A security appliance that tries to combine as many types of security solutions together as possible is referred to as this.
All-In-One (AIO) Security Appliance
Name 3 of the specific VPN Protocols mentioned.
Point-to-Point Tunneling
Layer 2 Forwarding
Layer 2 Tunneling
Internet Protocol Security
Secure Sockets Layers (SSL)
Transport Layer Security (TLS)
Define UTM
Unified Threat Management
* This is the most common type of all-in-one security appliance.
This is the process of increasing the security of devices and software - especially in relation to an OS.
Hardening or System Hardening
This can provide you with a way to locate open ports within your computer system.
nmap
This connects local ports to other local ports and includes trunking connections.
Switch
NAT allows us to create personal networks while also using the Internet and larger networks that can also be connected together. How does it do this?
A single IP address is used to provide access from the personal network (usually smaller) to the larger network / Internet via a Gateway Router.
URL / website content filtering, gateway email spam filters, encryption, proxies, anti-phishing software, and data loss prevention are this.
Types of Web Threat Protection
The main, built-in security firewall for Windows.
Microsoft Windows Defender
The 3 possible actions that can be performed using an iptable.
Accept, Drop, or Reject
This is a device specifically aimed at keeping the network safe from outside threats and actors.
Firewall
Static NAT
Define QoS and when you would use it.
* Zoom Meetings / Voice Over IP (VOIP) Phone Calls