4.1 Basic Network Security Flashcards

(19 cards)

1
Q

Data in Transit

A

Data actively moving across a network (e.g., email, web traffic). Protected via TLS or IPsec encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data at Rest

A

Data stored on physical media (e.g., SSDs, databases). Protected via Full Disk Encryption (FDE) or file-level encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PKI (Public Key Infrastructure)

A

A system of digital certificates and Certificate Authorities (CA) that verify the identity of users and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Self-Signed Certificate

A

A certificate signed by the same entity it identifies; cost-effective for internal testing but triggers browser warnings for public users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MFA (Multifactor Authentication)

A

Security requiring 2+ factors: Something you KNOW (password), something you HAVE (token), or something you ARE (biometrics).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSO (Single Sign-On)

A

An authentication method allowing a user to log in once and access multiple related but independent software systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RADIUS

A

A common AAA protocol used for network access (VPN, Wi-Fi). Encrypts only the password; uses UDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TACACS+

A

A Cisco-derived AAA protocol used for device administration. Encrypts the entire packet; uses TCP; separates AAA functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

LDAP (Lightweight Directory Access Protocol)

A

The standard protocol used to query and modify information in directory service providers like Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SAML (Security Assertion Markup Language)

A

An XML-based standard for exchanging authentication and authorization data between an Identity Provider and a Service Provider (used for Web SSO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Least Privilege

A

The security principle of providing a user only the minimum level of access necessary to perform their job functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Role-Based Access Control (RBAC)

A

Assigning permissions based on a user’s job function (Role) rather than their individual identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Geofencing

A

Using GPS or IP location to create a virtual geographic boundary; can trigger alerts or block access if a device leaves the area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot vs. Honeynet

A

A Honeypot is a single decoy system; a Honeynet is an entire network of decoys used to study attacker behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CIA Triad

A

The core goals of security: Confidentiality (secrecy), Integrity (accuracy/no tampering), and Availability (uptime/access).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk vs. Vulnerability vs. Exploit

A

Vulnerability is a weakness; Exploit is the method of using that weakness; Risk is the potential for loss/damage.

17
Q

PCI DSS / GDPR

A

PCI DSS: Standards for protecting credit card data. GDPR: Strict EU regulations regarding personal data privacy and locality.

18
Q

OT / SCADA / ICS

A

Industrial systems that control physical infrastructure (power, water). Requires strict segmentation from the IT network.

19
Q

Network Segmentation

A

Isolating different types of traffic (IoT, Guest, BYOD, Production) using VLANs and firewalls to prevent lateral movement of threats.