Demonstration should include the following:
- Anti-malware software
- Host-based
- Cloud/server-based
- Network-based
- Switch port security
- DHCP snooping
- ARP inspection
- MAC address filtering
- VLAN assignments
- Security policies
- Disable unneeded network services
- Use secure protocols
- Secure Shell (SSH)
- SNMPv3
- Transport Layer Security (TLS)/SSL
- SFTP
- HyperText Transfer Protocol Secure (HTTPS)
- Internet Protocol Security (IPSec)
- Access lists
- Web/content filtering
- Port filtering
- IP filtering
- Implicit deny
- Wireless security
- WEP
- WPA/WPA2
- Temporal Key Integrity Protocol (TKIP)/Advanced Encryption Standard (AES)
- 802.1x
- Transport Layer Security/Tunneled Transport Layer Security (TLS/TTLS)
- MAC filtering
- User authentication
- Challenge Handshake Authentication Protocol (CHAP)/Microsoft CHAP (MSCHAP)
- Password Authentication Protocol (PAP)
- Extensible Authentication Protocol (EAP)
- Kerberos
- Multifactor authentication
- Two-factor authentication
- Single sign-on
- Hashes
- MD5
- Secure Hash Algorithm (SHA)
Process/Skill Questions:
- What are some examples of two-factor/multifactor authentication?
- What is the difference between encryption and authentication?
- What is the purpose of a network access list?