9781111640125_IM_ch07

Security+ Guide to Network Security Fundamentals

  • Notes
  • 9
  • 100% (1) 1 out of 1 people found this document helpful

This preview shows page 5 - 7 out of 9 pages.

5. Note that one of the most dreaded attacks is a denial of service (DoS) attack or distributed denial of service (DDoS), which attempts to prevent a system from performing its normal functions through a deliberate attempt to prevent authorized users from access to the system. 6. Describe how a SYN flood attack works and how to defend against it. 7. Define a log, which is a record of events that occur. Logs related to computer security have become particularly important. 8. Discuss the common types of hardware logs, including: a. Network intrusion detection systems (NIDS) b. Domain Name System (DNS) c. Proxy servers d. Firewalls 9. Discuss the types of items that should be examined in a firewall log: a. IP addresses that are being rejected and dropped b. Probes to ports that have no application services running on them c. Source-routed packets d. Suspicious outbound connections e. Unsuccessful logins Network Design Management 1. Explain that network separation to prevent bridging, loop protection, and VLAN management are three of the principles that should be considered in network design management. 2. Discuss the importance of using network separation to protect sensitive network resources such as human resources. 3. Use Figure 7-8 to explain a switching loop which causes a broadcast storm. 4. Explain that it is possible to segment a network by physical devices grouped into logical units through a virtual LAN (VLAN).
Image of page 5

Subscribe to view the full document.

Security+ Guide to Network Security Fundamentals, Fourth Edition 7-6 5. Discuss the general principles for managing VLANs. Port Security 1. Explain ports can be secured through disabling unused ports, using MAC limiting and filtering, and through IEEE 802.1x. 2. Discuss how you can help secure a network by disabling unused ports. 3. Note that MAC limiting and filtering will filter and limit the number of media access control (MAC) addresses allowed on a single port. 4. Use Table 7-5 to discuss the configuration options for MAC limiting and filtering. 5. Explain that IEEE 802.1x blocks all traffic on a port-by-port basis until the client is authenticated using credentials stored on an authentication server. Securing Network Applications 1. Explain that applications including virtualization, IP telephony, and cloud computing require special security considerations. Virtualization 1. Define virtualization, which is a means of managing and presenting computer resources by function without regard to their physical layout or location. 2. Explain that with operating system virtualization a virtual machine is simulated as a self-contained software environment by the host system (the native operating system to the hardware), but appears as a guest system (a foreign virtual operating system). 3. Discuss the security advantages to hosts running virtualization and contrast the advantages with the disadvantages.
Image of page 6
Image of page 7
You've reached the end of this preview.
  • '
  • NoProfessor
  • Transmission Control Protocol, File Transfer Protocol, Network Security Fundamentals, Security+ Guide

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern