Network Security Flashcards

CC Domain 4

1
Q

security appliance

A

general term used to describe a network device that performs some kind of security function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Endpoint

A

general term used to describe a computing device on a network (such as a laptop, desktop, mobile device, smartphone, tablet, or even a server).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet of Things (IoT)

A

general term that is loosely used to describe devices that historically did not connect to the Internet (or a network) that now have network connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Application (Layer 7)

A

consists of protocols used by computer applications to perform certain functions (such as a web browser using the HTTP protocol to access a website).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Presentation (Layer 6)

A

responsible for translating data from something the user expects to something the network expects (and vice versa) so that it may be transferred over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Session (Layer 5)

A

responsible for setting up, controlling, and tearing down the connection between applications communicating between two different computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Transport (Layer 4)

A

handles end-to-end transport services and the establishment of logical connections between two computers (e.g., a clientserver connection).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network (Layer 3)

A

responsible for the routing and route selection for network packets based on logical IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Link (Layer 2)

A

responsible for transmitting and delivery of frames throughout a LAN based on the unique physical MAC addresses of the devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Physical (Layer 1)

A

with how bits (binary 1’s and 0’s) are transmitted and received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(TCP/IP) model

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Application Layer of the TCP/IP model

A

provides various services, processes, and protocols that run on a network and are used by user applications (such as a web browser).
Application, Presentation and Session osi model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

A

protocols are often lumped together in conversation since the SSL protocol was the predecessor to TLS; however, they are different protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Host-to-Host Layer of the TCP/IP model

A

sometimes also called the Transport Layer since it loosely maps to the Transport Layer of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Internet Layer of the TCP/IP model

A

provides logical addressing and routing of IP network traffic. This layer is sometimes also referred to as the Network Layer because it loosely maps to the Network Layer (Layer 3) of the OSI model.

17
Q

Network Access Layer of the TCP/IP model

A

loosely maps to the lower two layers (Layer 1 and Layer 2) of the OSI model (Physical and Data Link, respectively).

18
Q

conducting Research

A

primary purpose of the first step in the process of planning a cyberattack is to conduct research about the planned target organization or victim

19
Q

Identifying Targets

A

the cyberattacker pieces together the various bits of information collected in the previous phase.

20
Q

Exploiting Targets

A

attacker takes advantage of vulnerabilities in systems or networks to gain unauthorized access.

21
Q

iming and Race Conditions

A

also called a race condition attack, is an entire family of attacks in which the attacker takes advantage of the time between a sequence of events.

22
Q

HTTP response splitting

A

another type of attack where an attacker sends a malicious script to a website.

23
Q

Pretexting

A

uses a fake scenario to deceive someone

24
Q

quid pro quo (QPQ)

A

exchange of information or goods, such as a purchase.

25
Q

Password Attacks

A

can gain access to the data and systems that are their ultimate objective.

26
Q

Man-in-the Middle Attacks

A

class of attacks in which a cyberattacker intercepts communication between two entities

27
Q

Doing Bad Things

A

include deploying malware, writing scripts, guessing passwords, and using social
engineering and MITM attacks.

28
Q

Advanced Persistent Threat

A

stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period

29
Q

Network Segmentation

A

network design approach that allows organizations to group portions of the network into segments, each acting like a small network.

30
Q

Demilitarized Zones

A

network segment that is positioned in between the organization’s
connection to the Internet and their internal networks
purpose of the DMZ is to create a buffer zone between the
organization’s internal network and the outside world.

31
Q

Network Access Control

A

technology that allows organizations to implement controls that limit what devices can connect to their network
if you want to connect to a corporate network that is configured for NAC, the network
will not allow your computer to connect until it first checks your computer to see if it meets certain criteria based on a policy.

32
Q

Internet of Things Security

A

refers to many different kinds of physical devices that connect to the Internet or IP networks. IoT devices are sometimes called smart devices because they frequently contain processing capability, often in combination with sensors, robotics, and
automation technology.

33
Q

On-demand self-service

A

Cloud service customers can configure the computing resources they need (what they need, when they need it), allowing them to tailor resources to their needs.

34
Q

Rapid elasticity

A

Cloud service customers can rapidly scale resources (in some cases automatically) as needed to acquire more or less capability.

35
Q

Resource pooling

A

Computing resources of the CSP are pooled and shared across multiple consumers (referred to as cloud service customers or tenants) in a manner that abstracts the consumer from the underlying implementation.

36
Q

Measured service

A

amount of resources used by the CSC can be automatically metered and measured.

37
Q

Broad network access

A

CSC access is enabled over the network and supported by many different client platforms running on a wide variety of endpoint devices (e.g., laptops, desktops, mobile phones).