5.1 Key Security Concepts Flashcards

Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques). (21 cards)

1
Q

What are the key security concepts in network security?

A
  • Threat
  • Vulnerability
  • Exploit
  • Mitigation

Threat – Any potential danger to an asset or system integrity.

Vulnerability – A weakness or gap in a system that can be exploited.

Exploit – A method or tool used to take advantage of vulnerabilities.

Mitigation – Actions taken to reduce the severity or impact of threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List three common network threats.

A
  1. Malware
  2. Phishing Attacks
  3. Denial of Service (DoS) Attacks

Malware – Malicious software designed to harm or exploit systems.

Phishing Attacks – Deceptive attempts to steal sensitive information.

Denial of Service (DoS) Attacks – Overloading a system to disrupt its functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List three types of malware.

A
  1. Viruses
  2. Worms
  3. Trojans

Viruses – Malicious programs that attach to files and spread when executed.

Worms – Self-replicating malware that spreads without user action.

Trojans – Deceptive software that appears legitimate but contains harmful code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why are weak passwords considered vulnerabilities?

A

They can be easily guessed or cracked, allowing unauthorized access.

Implementing complex passwords and multi-factor authentication mitigates unauthorized access risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False:

A zero-day exploit refers to vulnerabilities that are known publicly.

A

False

Zero-day exploits target vulnerabilities unknown to vendors, giving no prior notice or opportunity to patch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define:

phishing attacks

A

Fraudulent emails or websites trick users into revealing sensitive data.

Phishing relies on social engineering to manipulate victims into providing credentials, financial information, or personal details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a commonly used tool to mitigate phishing attacks.

A

Email filtering solutions

Email filters help detect and quarantine suspicious emails, reducing phishing attack risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does domain spoofing contribute to phishing attacks?

A

Attackers impersonate legitimate domains to trick users.

Domain spoofing creates deceptive URLs that mimic trusted websites, increasing the success rate of phishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is social engineering?

A

A tactic that manipulates people into revealing sensitive information.

This often* exploits trust and lack of awareness* to deceive users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List three network mitigation techniques.

A
  1. Firewalls
  2. Intrusion Detection Systems (IDS)
  3. Antivirus software

Firewalls – Block unauthorized network traffic.

Intrusion Detection Systems (IDS) – Monitor and alert on suspicious activity.

Antivirus Software – Detect and remove malicious programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the principle of least privilege (PoLP)?

A

Users and systems should have only the minimum access necessary.

PoLP reduces the risk of insider threats and limits potential damage if credentials are compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two types of network vulnerabilities?

A
  1. Software vulnerabilities
  2. Misconfigured devices

Software Vulnerabilities – Flaws in programs that attackers can exploit.

Misconfigured Devices – Improper settings that create security gaps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False:

Antivirus software alone ensures complete network security.

A

False

Antivirus software must be part of a broader, layered defense strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank:

A firewall primarily protects networks by filtering ______.

A

traffic

Firewalls filter incoming and outgoing network traffic based on predefined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is regular patching critical in security?

A

It addresses vulnerabilities, preventing exploitation.

Timely patching is essential in defending against known threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a zero-trust security model?

A

A security model that requires continuous verification.

Zero-trust assumes no entity is trustworthy by default. It enforces strict authentication, least privilege access, and micro-segmentation to limit unauthorized movement within a network.

17
Q

What’s a technique to mitigate unauthorized access to network devices?

A

Secure passwords and access control lists (ACLs).

ACLs enforce policies by restricting unauthorized access and enhancing network security.

18
Q

What is the goal of penetration testing?

A

To discover vulnerabilities before attackers exploit them.

Penetration testing simulates real-world attacks to strengthen security measures.

19
Q

Fill in the blank:

Intrusion Detection Systems (IDS) primarily ______ network threats.

A

detect

IDS monitors network traffic, generating alerts for suspicious activity.

20
Q

What is the role of encryption in network security?

A

It protects data confidentiality by converting it into unreadable format.

Encryption ensures data privacy, even if intercepted by unauthorized parties.

21
Q

True or False:

End-to-end encryption (E2EE) keeps data encrypted from sender to receiver.

A

True

E2EE prevents unauthorized access to data in transit, commonly used in messaging apps and secure communications.