Connect and Protect: Networks and Network Security Flashcards

1
Q

Active packet sniffing

A

A type of attack where data packets are manipulated in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Address Resolution Protocol (ARP)

A

Used to determine the MAC address of the next router or device to traverse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bandwidth

A

The maximum data transmission capacity over a network, measured by
bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Baseline configuration

A

A documented set of specifications within a system that is used as a basis for future builds, releases, and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bluetooth

A

Used for wireless communication with nearby physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Botnet

A

A collection of computers infected by malware that are under the control of a
single threat actor, known as the “bot herder”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud-based firewalls

A

Software firewalls that are hosted by the cloud service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud computing

A

The practice of using remote servers, application, and network services that are hosted on the internet instead of on local physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud network

A

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Controlled zone

A

A subnet that protects the internal network from the uncontrolled zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data packet

A

A basic unit of information that travels from one device to another within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of service (DoS) attack

A

An attack that targets a network or server and floods it with network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Distributed denial of service (DDoS) attack

A

A type of denial of service attack that
uses multiple devices or servers located in different locations to flood the target
network with unwanted traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain Name System (DNS)

A

A networking protocol that translates internet domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encapsulation

A

A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

File Transfer Protocol (FTP)

A

Used to transfer files from one device to another over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Firewall

A

A network security device that monitors traffic to or from your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Forward proxy server

A

A server that regulates and restricts a person’s access to the
internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hardware

A

The physical components of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hub

A

A network device that broadcasts information to every device on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hypertext Transfer Protocol (HTTP)

A

An application layer protocol that provides a method of communication between clients and website servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hypertext Transfer Protocol Secure (HTTPS)

A

A network protocol that provides a
secure method of communication between clients and servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Identity and access management (IAM)

A

A collection of processes and technologies
that helps organizations manage digital identities in their environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IEEE 802.11 (Wi-Fi)

A

A set of standards that define communication for wireless LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Internet Control Message Protocol (ICMP)

A

An internet protocol used by devices to
tell each other about data transmission errors across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Internet Control Message Protocol (ICMP) flood

A

A type of DoS attack performed by
an attacker repeatedly sending ICMP request packets to a network server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Internet Protocol (IP)

A

A set of standards used for routing and addressing data packets as they travel between devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Internet Protocol (IP) address

A

A unique string of characters that identifies the location of a device on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

IP spoofing

A

A network attack performed when an attacker changes the source IP of a
data packet to impersonate an authorized system and gain access to a network

30
Q

Local area network (LAN)

A

A network that spans small areas like an office building, a school, or a home

31
Q

Media Access Control (MAC) address

A

A unique alphanumeric identifier that is
assigned to each physical device on a network

32
Q

Modem

A

A device that connects your router to the internet and brings internet access
to the LAN

33
Q

Multi-factor authentication (MFA)

A

A security measure that requires a user to verify their identity in two or more ways to access a system or network

34
Q

Network

A

A group of connected devices

35
Q

Network log analysis

A

The process of examining network logs to identify events of interest

36
Q

Network protocols

A

A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data

37
Q

Network segmentation

A

A security technique that divides the network into segments

38
Q

Operating system (OS)

A

The interface between computer hardware and the user

39
Q

Open systems interconnection (OSI) model

A

A standardized concept that describes
the seven layers computers use to communicate and send data over the network

40
Q

On-path attack

A

An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit

41
Q

Packet sniffing

A

The practice of capturing and inspecting data packets across a
network

42
Q

Passive packet sniffing

A

A type of attack where a malicious actor connects to a network hub and looks at all traffic on the network

43
Q

Patch update

A

A software and operating system update that addresses security vulnerabilities within a program or product

44
Q

Penetration testing

A

A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes

45
Q

Ping of death

A

A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB

46
Q

Port

A

A software-based location that organizes the sending and receiving of data
between devices on a network

47
Q

Port filtering

A

A firewall function that blocks or allows certain port numbers to limit unwanted communication

48
Q

Proxy server

A

A server that fulfills the requests of its clients by forwarding them to other servers

49
Q

Replay attack

A

A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time

50
Q

Reverse proxy server

A

A server that regulates and restricts the Internet’s access to an internal server

51
Q

Router

A

A network device that connects multiple networks together

52
Q

Secure File Transfer Protocol (SFTP)

A

A secure protocol used to transfer files from one device to another over a network

53
Q

Secure shell (SSH)

A

A security protocol used to create a shell with a remote system

54
Q

Security hardening

A

The process of strengthening a system to reduce its vulnerabilities and attack surface

55
Q

Security information and event management (SIEM)

A

An application that collects and analyzes log data to monitor critical activities for an organization

56
Q

Security zone

A

A segment of a company’s network that protects the internal network from the internet

57
Q

Simple Network Management Protocol (SNMP)

A

A network protocol used for monitoring and managing devices on a network

58
Q

Smurf attack

A

A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with ICMP packets

59
Q

Speed

A

The rate at which a device sends and receives data, measured by bits per
second

60
Q

Stateful

A

A class of firewall that keeps track of information passing through it and
proactively filters out threats

61
Q

Stateless

A

A class of firewall that operates based on predefined rules and that does not keep track of information from data packets

62
Q

Subnetting

A

The subdivision of a network into logical groups called subnets

63
Q

Switch

A

A device that makes connections between specific devices on a network by sending and receiving data between them

64
Q

Synchronize (SYN) flood attack

A

A type of DoS attack that simulates a TCP/IP
connection and floods a server with SYN packets

65
Q

TCP/IP Model

A

A framework used to visualize how data is organized and transmitted across a network

66
Q

Transmission Control Protocol (TCP)

A

An internet communication protocol that
allows two devices to form a connection and stream data

67
Q

Transmission Control Protocol (TCP) 3-way handshake

A

A three-step process used to establish an authenticated connection between two devices on a network

68
Q

Uncontrolled zone

A

The portion of the network outside the organization

69
Q

User Datagram Protocol (UDP)

A

A connectionless protocol that does not establish a connection between devices before transmissions

70
Q

Virtual Private Network (VPN)

A

A network security service that changes your public IP address and masks your virtual location so that you can keep your data private when you are using a public network like the internet

71
Q

Wide Area Network (WAN)

A

A network that spans a large geographic area like a city, state, or country

72
Q

Wi-Fi Protected Access (WPA)

A

A wireless security protocol for devices to connect to the internet