Connect and Protect: Networks and Network Security Flashcards

(72 cards)

1
Q

What is active packet sniffing?

A

A type of attack where data packets are manipulated in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Address Resolution Protocol (ARP)?

A

Used to determine the MAC address of the next router or device to traverse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is bandwidth?

A

The maximum data transmission capacity over a network, measured by bits per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a baseline configuration?

A

A documented set of specifications within a system that is used as a basis for future builds, releases, and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Bluetooth?

A

Used for wireless communication with nearby physical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a botnet?

A

A collection of computers infected by malware that are under the control of a single threat actor, known as the ‘bot herder’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are cloud-based firewalls?

A

Software firewalls that are hosted by the cloud service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cloud computing?

A

The practice of using remote servers, application, and network services that are hosted on the internet instead of on local physical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a cloud network?

A

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a controlled zone?

A

A subnet that protects the internal network from the uncontrolled zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a data packet?

A

A basic unit of information that travels from one device to another within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a denial of service (DoS) attack?

A

An attack that targets a network or server and floods it with network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a distributed denial of service (DDoS) attack?

A

A type of denial of service attack that uses multiple devices or servers located in different locations to flood the target network with unwanted traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Domain Name System (DNS)?

A

A networking protocol that translates internet domain names into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is encapsulation?

A

A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is File Transfer Protocol (FTP)?

A

Used to transfer files from one device to another over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a firewall?

A

A network security device that monitors traffic to or from your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a forward proxy server?

A

A server that regulates and restricts a person’s access to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is hardware?

A

The physical components of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a hub?

A

A network device that broadcasts information to every device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Hypertext Transfer Protocol (HTTP)?

A

An application layer protocol that provides a method of communication between clients and website servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Hypertext Transfer Protocol Secure (HTTPS)?

A

A network protocol that provides a secure method of communication between clients and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Identity and access management (IAM)?

A

A collection of processes and technologies that helps organizations manage digital identities in their environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does IEEE 802.11 (Wi-Fi) define?

A

A set of standards that define communication for wireless LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the Internet Control Message Protocol (ICMP)?
An internet protocol used by devices to tell each other about data transmission errors across the network.
26
What is an ICMP flood?
A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server.
27
What is the Internet Protocol (IP)?
A set of standards used for routing and addressing data packets as they travel between devices on a network.
28
What is an IP address?
A unique string of characters that identifies the location of a device on the internet.
29
What is IP spoofing?
A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network.
30
What is a Local area network (LAN)?
A network that spans small areas like an office building, a school, or a home.
31
What is a Media Access Control (MAC) address?
A unique alphanumeric identifier that is assigned to each physical device on a network.
32
What is a modem?
A device that connects your router to the internet and brings internet access to the LAN.
33
What is Multi-factor authentication (MFA)?
A security measure that requires a user to verify their identity in two or more ways to access a system or network.
34
What is a network?
A group of connected devices.
35
What is network log analysis?
The process of examining network logs to identify events of interest.
36
What are network protocols?
A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data.
37
What is network segmentation?
A security technique that divides the network into segments.
38
What is an Operating system (OS)?
The interface between computer hardware and the user.
39
What is the Open systems interconnection (OSI) model?
A standardized concept that describes the seven layers computers use to communicate and send data over the network.
40
What is an on-path attack?
An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit.
41
What is packet sniffing?
The practice of capturing and inspecting data packets across a network.
42
What is passive packet sniffing?
A type of attack where a malicious actor connects to a network hub and looks at all traffic on the network.
43
What is a patch update?
A software and operating system update that addresses security vulnerabilities within a program or product.
44
What is penetration testing?
A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes.
45
What is a ping of death?
A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB.
46
What is a port?
A software-based location that organizes the sending and receiving of data between devices on a network.
47
What is port filtering?
A firewall function that blocks or allows certain port numbers to limit unwanted communication.
48
What is a proxy server?
A server that fulfills the requests of its clients by forwarding them to other servers.
49
What is a replay attack?
A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time.
50
What is a reverse proxy server?
A server that regulates and restricts the Internet's access to an internal server.
51
What is a router?
A network device that connects multiple networks together.
52
What is Secure File Transfer Protocol (SFTP)?
A secure protocol used to transfer files from one device to another over a network.
53
What is Secure Shell (SSH)?
A security protocol used to create a shell with a remote system.
54
What is security hardening?
The process of strengthening a system to reduce its vulnerabilities and attack surface.
55
What is Security Information and Event Management (SIEM)?
An application that collects and analyzes log data to monitor critical activities for an organization.
56
What is a security zone?
A segment of a company’s network that protects the internal network from the internet.
57
What is Simple Network Management Protocol (SNMP)?
A network protocol used for monitoring and managing devices on a network.
58
What is a Smurf attack?
A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with ICMP packets.
59
What is speed in networking?
The rate at which a device sends and receives data, measured by bits per second.
60
What does stateful mean in terms of firewalls?
A class of firewall that keeps track of information passing through it and proactively filters out threats.
61
What does stateless mean in terms of firewalls?
A class of firewall that operates based on predefined rules and does not keep track of information from data packets.
62
What is subnetting?
The subdivision of a network into logical groups called subnets.
63
What is a switch?
A device that makes connections between specific devices on a network by sending and receiving data between them.
64
What is a Synchronize (SYN) flood attack?
A type of DoS attack that simulates a TCP/IP connection and floods a server with SYN packets.
65
What is the TCP/IP model?
A framework used to visualize how data is organized and transmitted across a network.
66
What is Transmission Control Protocol (TCP)?
An internet communication protocol that allows two devices to form a connection and stream data.
67
What is the TCP 3-way handshake?
A three-step process used to establish an authenticated connection between two devices on a network.
68
What is an uncontrolled zone?
The portion of the network outside the organization.
69
What is User Datagram Protocol (UDP)?
A connectionless protocol that does not establish a connection between devices before transmissions.
70
What is a Virtual Private Network (VPN)?
A network security service that changes your public IP address and masks your virtual location to keep your data private when using a public network.
71
What is a Wide Area Network (WAN)?
A network that spans a large geographic area like a city, state, or country.
72
What is Wi-Fi Protected Access (WPA)?
A wireless security protocol for devices to connect to the internet.