Managing Network Settings Flashcards

Day4_Threat-Hunting Concepts & Architecture Concepts (26 cards)

1
Q

Which DNS option digitally signs records in a DNS zone?

A

DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtual networks can be created in both a cloud environment and an _______.

A

on-premises virtualization environment

This highlights the versatility of virtual networks across different setups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of segregating network devices on their own networks?

A
  • Enhance security
  • Protect sensitive data

Segregation can be achieved through VLANs or isolated networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When configuring a virtual network, what does enabling local DHCP service do?

A

Distributes IP addresses to VMs

This simplifies network configuration for virtual machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To connect a virtual machine to a newly added virtual network, what must be modified?

A

Each virtual machine’s network settings

This ensures the VM is linked to the correct network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of the DHCP settings in the Virtual Network Editor?

A
  • Set lease interval for clients
  • Specify starting and ending IP addresses

These settings help manage IP address allocation for connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank: A NAT network shares the host’s _______ with virtual machines.

A

IP address

This allows VMs to access external networks while keeping them isolated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of VLANs in network configuration?

A
  • Network segregation
  • Performance improvement
  • Isolation of sensitive stations

VLANs allow for breaking up a single Ethernet switch into multiple networks for better management and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two network services widely used in networks?

A
  • DNS
  • DHCP

These services are essential for both personal and organizational networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is one method to harden devices running DHCP and DNS?

A
  • Apply patches
  • Use Firewall settings

Hardening involves securing the devices against potential attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can an attacker do if they compromise a DHCP host?

A

Specify a fraudulent DNS server for clients

This can redirect clients to malicious websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of Vendor Classes in DHCP?

A

To assign DHCP settings for specific device types

This helps in identifying and managing traffic from certain devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: DNSSEC is used to __________.

A

digitally sign DNS zones

This ensures the integrity and authenticity of DNS data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of Group Policy Management in DNS?

A

To configure centralized settings for DNS clients

This can enforce policies like requiring DNSSEC validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is a shorter lease duration beneficial for in DHCP?

A

Shorter lease duration prevents exhaustion of IP addresses and allows devices to have plent of IPs to temporarily connect to a network

Important in environments with many transient users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the significance of digitally signing a DNS zone?

A

Clients can verify the validity of the signature

This helps ensure that the DNS data has not been tampered with.

17
Q

What should be configured in Group Policy for DNSSEC?

A

Require DNS clients to check data validation

This enhances security by ensuring clients validate DNS responses.

18
Q

Wi-Fi router hardening notes

A

The first step in protecting a Wi-Fi router is at the network level

This is crucial for both enterprise and home networks, especially with the rise of remote work.

19
Q

What security setting is recommended for a Wi-Fi router?

A

WPA/WPA2-Personal

This requires a pre-shared key or password for connecting devices.

20
Q

Fill in the blank: The Wi-Fi router acts as a _______ client when using WPA/WPA2-Enterprise.

A

RADIUS

Connecting devices are referred to as supplicants.

21
Q

What does the RADIUS server do in a WPA/WPA2-Enterprise setup?

A

RADIUS servers authenticate client connections

It performs user authentication instead of the Wi-Fi router.

22
Q

What is the default port for RADIUS servers?

A

UDP port 1812

This port can be changed, but 1812 is the standard.

23
Q

True or false: WEP is a recommended security protocol for Wi-Fi networks.

A

FALSE

WEP is deprecated and should not be used.

24
Q

What can be enabled for a guest network on a Wi-Fi router?

A
  • Different network name
  • Open or secured access

Guest networks can have varying security settings.

25
What does hiding the **SSID** accomplish?
Makes the network name invisible ## Footnote Users must know the network name to connect.
26
What is a potential risk of enabling **DHCP** on a secured Wi-Fi network?
A potential **risk** of *enabling* DHCP is a DoS attack ## Footnote Attackers can spoof connections to consume all available IP addresses.