Page 20 - Security+ (635 notes by Nikkhah)
P. 20

Switches
            300- Switches connect network segments and work at Layer 2 of the OSI model.

            301- Switches use MAC addresses to forward network traffic.

            302- Switches offer better security than routers.
            303- Switches are prone to ARP spoofing, DoS, and MITM attacks.

            304- Hackers can use MAC flooding to exploit a poorly configured switch.



            Securing workstations

            305- Users should not create weak passwords.
            306- Passwords should be changed at regular intervals.

            307- Virus scanners with the latest virus signatures should be used on all workstations.
            308- Web  browsers  should  be  properly  configured  to  avoid  downloading  or  running active

            content from different web sites.

            309- Users should be instructed to lock their workstations when they are away.



            Securing servers
            310- Servers should be kept in locked rooms with limited physical access.

            311- Auditing and logging of user and administrator activities should be done.
            312- Users should be granted only need-based (or role-based) access to servers.

            313- Files and folders should be protected using ACLs.

            314- NetworkOperating Systems (NOSs) installed on servers should be kept up to date.
            315- Servers  accessible  from  outside,  such  as  web  servers,  mail  servers,  remote access

            servers, and VPN servers, should be placed in demilitarized zones.

            316- All communications between servers and workstations should be encrypted.



            UTP/STP cables
            317- The twists in cables prevent electromagnetic interference, which results in crosstalk.

            318- These cables are twisted pairs of insulated cables bundled inside a plastic sheath.
            319- Their category number usually identifies them.

            320- UTP/STP cables use RJ-11 (for telephone) and RJ-45 (for computers) connectors.

            321- UTP cable is vulnerable to EMI, RFI, and eavesdropping.
            322- STP cable provides protection from EMI and RFI.





                   www.hrnikkhah.com                        by :  Hamid  Reza  Nikkhah                 Page 18
   15   16   17   18   19   20   21   22   23   24   25