Connect and Protect: Networks and Network Security Flashcards

1
Q

Bandwidth

A

The maximum data transmission capacity over a network, measured by bits per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud computing

A

The practice of using remote servers, application, and network services that are hosted on the internet instead of on local physical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloud network

A

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data packet

A

A basic unit of information that travels from one device to another within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hub

A

A network device that broadcasts information to every device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet Protocol (IP)

A

A set of standards used for routing and addressing data packets as they travel between devices on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet Protocol (IP) address

A

A unique string of characters that identifies the location of a device on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Local Area Network (LAN)

A

A network that spans small areas like an office building, a school, or a home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Media Access Control (MAC) address

A

A unique alphanumeric identifier that is assigned to each physical device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Modem

A

A device that connects your router to the internet and brings internet access to the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network

A

A group of connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Open systems interconnection (OSI) model

A

A standardized concept that describes the seven layers computers use to communicate and send data over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Packet sniffing

A

The practice of capturing and inspecting data packets across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port

A

A software-based location that organizes the sending and receiving of data between devices on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Router

A

A network device that connects multiple networks together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Speed

A

The rate at which a device sends and receives data, measured by bits per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Switch

A

A device that makes connections between specific devices on a network by sending and receiving data between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP/IP model

A

A framework used to visualize how data is organized and transmitted across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Transmission Control Protocol (TCP)

A

An internet communication protocol that allows two devices to form a connection and stream data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

User Datagram Protocol (UDP)

A

A connectionless protocol that does not establish a connection between devices before transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Wide Area Network (WAN)

A

A network that spans a large geographic area like a city, state, or country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Internet protocol

A

What does IP stand for?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does LAN stand for?

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does MAC stand for?

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does OSI stand for?
Open Systems Interconnection
26
What does TCP stand for?
Transmission Control Protocol
27
What does UDP stand for?
User Datagram Protocol
28
What does WAN stand for?
Wide Area Network
29
Firewall
A network security device that monitors traffic to or from your network.
30
What do servers provide?
They provide information and services for devices like computers, smart home devices, and smartphones on the network.
31
Wireless access point
Sends and receives digital signals over radio waves creating a wireless network.
32
Network diagrams
Maps that show the devices on the network and how they connect.
33
What are the 3 services that CSPs provide?
Software as a service (SaaS), Infrastructure as a service (IaaS), and Platform as a service (PaaS)
34
Software as a service (SaaS)
Refers to software suites operated by the CSP that a company can use remotely without hosting the software.
35
Infrastructure as a service (IaaS)
Refers to the use of virtual computer components offered by the CSP.
36
Platform as a service (PaaS)
Refers to tools that application developers can use to design custom applications for their company.
37
What are the 4 layers of the TCP/IP models?
Network Access, Transport, Internet, and Application layers.
38
What are the 7 layers of the OSI model?
Physical, Data Link, Network, Transport, Session, Presentation, and Application layers
39
Address Resolution Protocol (ARP)
A network protocol used to determine the MAC address of the next router or device on the path.
40
Cloud-based firewalls
Software firewalls that are hosted by the cloud service provider.
41
Controlled zone
A subnet that protects the internal network from the uncontrolled zone.
42
Domain Name System (DNS)
A networking protocol that translates internet domain names into IP addresses.
43
Encapsulation
A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets.
44
Firewall
A network security device that monitors traffic to or from your network.
45
Forward proxy server
A server that regulates and restricts a person’s access to the internet.
46
Hypertext Transfer Protocol (HTTP)
An application layer protocol that provides a method of communication between clients and website servers.
47
Hypertext Transfer Protocol Secure (HTTPS)
A network protocol that provides a secure method of communication between clients and servers.
48
IEEE 802.11 (Wi-Fi)
A set of standards that define communication for wireless LANs.
49
Network protocols
A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data.
50
Network segmentation
A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data.
51
Port filtering
A firewall function that blocks or allows certain port numbers to limit unwanted communication.
52
Proxy server
A server that fulfills the requests of its clients by forwarding them to other servers.
53
Reverse proxy server
A server that regulates and restricts the internet's access to an internal server.
54
Secure File Transfer Protocol (SFTP)
A secure protocol used to transfer files from one device to another over a network.
55
Secure shell (SSH)
A security protocol used to create a shell with a remote system.
56
Security zone
A segment of a company’s network that protects the internal network from the internet.
57
Simple Network Management Protocol (SNMP)
A network protocol used for monitoring and managing devices on a network.
58
Stateful
A class of firewall that keeps track of information passing through it and proactively filters out threats.
59
Stateless
A class of firewall that operates based on predefined rules and does not keep track of information from data packets.
60
Subnetting
The subdivision of a network into logical groups called subnets.
61
Transmission Control Protocol (TCP)
An internet communication protocol that allows two devices to form a connection and stream data.
62
Uncontrolled zone
The portion of the network outside the organization.
63
Virtual private network (VPN)
A network security service that changes your public IP address and masks your virtual location so that you can keep your data private when you are using a public network like the internet.
64
User Datagram Protocol (UDP)
A connectionless protocol that does not establish a connection between devices before a transmission.
65
Internet Control Message Protocol (ICMP)
An internet protocol used by devices to tell each other about data transmission errors across the network.
66
What does ARP stand for?
Address Resolution Protocol
67
What does DNS stand for?
Domain Name System
68
What does HTTP and HTTPS stand for?
Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure
69
What does SFTP stand for?
Secure File Transfer Protocol
70
What does SNMP stand for?
Simple Network Management Protocol
71
What does TCP stand for?
Transmission Control Protocol
72
What does VPN stand for?
Virtual private network
73
What does WPA stand for?
Wi-Fi Protected Access
74
What does UDP stand for?
User Datagram Protocol
75
What does ICMP stand for?
Internet Control Message Protocol
76
Baseline configuration (baseline image)
A documented set of specifications within a system that is used as a basis for future builds, releases, and updates.
77
Hardware
The physical components of a computer.
78
Multi-factor authentication (MFA)
A security measure which requires a user to verify their identity in two or more ways to access a system or network.
79
Network log analysis
The process of examining network logs to identify events of interest.
80
Patch update
A software and operating system update that addresses security vulnerabilities within a program or product.
81
Operating system (OS)
The interface between computer hardware and the user.
82
Penetration testing (pen test)
A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes.
83
World-writable file
A file that can be altered by anyone in the world.
83
Security hardening
The process of strengthening a system to reduce its vulnerabilities and attack surface.
84
Brute force attack
A trial-and-error process of discovering private information.
85
What are the 2 types of brute force attacks?
Simple brute force attacks and Dictionary attacks
86
Simple brute force attacks
When attackers try to guess a user's login credentials. They might do this by entering any combination of usernames and passwords that they can think of until they find the one that works.
87
Dictionary attacks
When attackers use a list of commonly used passwords and stolen credentials from previous breaches to access a system. These are called “dictionary” attacks because attackers originally used a list of words from the dictionary to guess the passwords, before complex password rules became a common security practice.
88
What are some common measures organizations use to prevent brute force attacks and similar attacks?
Salting and hashing, MFA, CAPTCHA and reCAPTCHA, and password policies.
89
Intrusion detection system (IDS)
An application that monitors system activity and alerts on possible intrusions.
90
Intrusion prevention system (IPS)
An application that monitors system activity for intrusive activity and takes action to stop the activity.
91
Identity access management (IAM)
A collection of processes and technologies that helps organizations manage digital identities in their environment.
92
Zero-day
An exploit that was previously unknown.
93
Shared responsibility model
A model that states that the Cloud Share Provider (CSP) must take responsibility for security involving the cloud infrastructure, including physical data centers, hypervisors, and host operating systems.
94
What does IAM stand for?
Identity access management
95
What does IDS stand for?
Intrusion detection system
96
What does IPS stand for?
Intrusion prevention system
97
Cloud computing
A model for allowing convenient and on-demand network access to a shared pool of configurable computing resources.
98
What does CSP stand for?
Cloud service providers