Domain 4 Flashcards

Network Security

1
Q

two or more
computers linked together to share
data, information or resources

A

A network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A local area network (LAN) is

A

a network
typically spanning a single floor or
building. This is commonly a limited
geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wide area network (WAN) is

A

the long-distance connections between geographicallyremote networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

used to connect multiple devices in a network. They are wired devices and are not as smart as switches or routers

A

Hubs are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a network device
used to filter traffic

A

A firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

wired devices that know the addresses of the devices connected to them and route traffic to that port/device rather than retransmitting to all devices. They are smarter than hubs, but not as smart as routers

A

Switches are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A server is

A

a computer that provides
information to other computers on a
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Routers are used to

A

control traffic flow on
networks and are often used to connect
similar networks and control traffic low
between them. They determine the most efficient “route” for the traffic to flow across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Endpoints are

A

the ends of a network
communication link. One end is often at a
server where a resource resides, and the other end is often a client making a request to use a network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ethernet is

A

a standard
that defines wired connections of
networked devices. This standard defines the way data is
formatted over the wire to ensure
disparate devices can communicate
over the same cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Every network device is assigned a

A

a Media
Access Control (MAC) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What connects all devices behind the firewall in a small business network?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a potential drawback associated with the freedom provided by wireless networking?

A

Additional vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does micro-segmentation aid in protecting against?

A

Polymorphic tool sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An intrusion occurs

A

when an attacker
is able to bypass or thwart security
mechanisms and gain access to an organization’s resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intrusion detection is

A

a specific form
of monitoring that monitors recorded
information and real-time events to detect
abnormal activity indicating a potential
incident or intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What term describes a portion of the organization’s network that interfaces directly with the outside world and typically has more security controls and restrictions compared to the rest of the internal IT environment?

A

Demilitarized zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a potential alternative to expensive dedicated point-to-point connections?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does a Web Application Firewall (WAF) function in a network?

A

It monitors all traffic from the outside for malicious behavior before passing commands to a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the primary purpose of Virtual Local Area Networks (VLANs)?

A

Consolidate traffic across multiple switch ports

VLANs allow network administrators to use switches to create software-based LAN segments, consolidating traffic across multiple switch ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following tools can be used to grant remote users access to the internal IT environment?

A

VPN (virtual private network)

A VPN allows external users to gain access to the internal environment securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What might a user typically need to acknowledge before being allowed to access the internet in a hotel network?

A

Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How are VLANs used in Network Access Control (NAC) systems?

A

VLANs control whether devices connect to the corporate network or a guest network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the function of transfer switches or transformers in a redundant power system?

A

Enable seamless transition between power sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In a scenario requiring full redundancy, what should devices have in terms of power supplies?
Two power supplies connected to diverse sources
26
Why is an abnormal system shutdown in a data center a concern?
It may result in the loss or corruption of data
27
What is network monitoring or sniffing?
Monitoring traffic patterns to obtain information about a network
28
What is the purpose of the three-way handshake in networking?
Synchronizing and acknowledging requests
29
What is the three-way handshake?
SYN, SYN-ACK, ACK request to establish connection, acknowledgment, acknowledge the connection
30
Well-known ports
Ports 0-1023, related to the common protocols that are at the core of the Transport Control Protocol/Internet Protocol (TCP/IP) model, Domain Name Service (DNS), Simple Mail Transfer Protocol (SMTP), etc.
31
Registered ports
Ports 1024-49151, often associated with proprietary applications from vendors and developers. While they are officially approved by the Internet Assigned Numbers Authority (IANA), in practice many vendors simply implement a port of their choosing. Examples include Remote Authentication Dial-In User Service (RADIUS) authentication (1812), Microsoft SQL Server (1433/1434) and the Docker REST API (2375/2376)
32
Dynamic or private ports
Ports 49151 - 65535, Whenever a service is requested that is associated with well-known or registered ports, those services will respond with a dynamic port that is used for that session and then released.
33
What are well-known ports (0-1023) associated with?
Common protocols at the core of TCP/IP
34
What is resource pooling in the context of cloud computing?
35
What is a cloud arrangement in which the provider owns and manages the hardware, operating system, and applications in the cloud, while the customer retains ownership of the data?
36
What is one of the services offered by many MSPs, where they monitor firewalls and other security tools to provide expertise in triaging events?
Managed Detection and Response (MDR) Service
37
Which cloud computing model allows an enterprise to scale up new software or data-based services/solutions quickly without massive hardware installation?
38
Which organization's definition of cloud computing is commonly used globally?
National Institute of Standards and Technology (NIST)
39
What is the main purpose of an SLA?
To document specific parameters and minimum service levels
40
What distinguishes Memoranda of Understanding (MOU) or Memoranda of Agreement (MOA) from Service Level Agreements (SLA)?
MOUs/MOAs are more directly related to what can be done with a system or information, while SLAs specify more intricate aspects of services
41
Application programming interface (API)
A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or web tool.
42
Byte
The byte is a unit of digital information that most commonly consists of eight bits.
43
Encapsulation
Encapsulation Enforcement of data hiding and code hiding during all phases of software development and operational use. Bundling together data and methods is the process of encapsulation; its opposite process may be called unpacking, revealing, or using other terms. Also used to refer to taking any set of data and packaging it or hiding it in another data structure, as is common in network protocols and encryption.
43
Domain Name Service (DNS)
Domain Name Service (DNS) This acronym can be applied to three interrelated elements: a service, a physical server and a network protocol.
43
File Transfer Protocol (FTP)
File Transfer Protocol (FTP) The internet protocol (and program) used to transfer files between hosts.
44
Fragment attack
In a fragment attack, an attacker fragments traffic in such a way that a system is unable to put data packets back together.
45
Infrastructure as a Service (IaaS)
The provider of the core computing, storage and network hardware and software that is the foundation upon which organizations can build and then deploy applications. IaaS is popular in the data center where software and servers are purchased as a fully outsourced service and usually billed on usage and how much of the resource is used.
46
Internet Control Message Protocol (ICMP)
47
Internet Protocol (IPv4)
Standard protocol for transmission of data from source to destinations in packet-switched communications networks and interconnected systems of such networks
48
Man-in-the-Middle
An attack where the adversary positions himself in between the user and the system so that he can intercept and alter data traveling between them.
49
Microsegmentation
Microsegmentation Part of a zero-trust strategy that breaks LANs into very small, highly localized zones using firewalls or similar technologies. At the limit, this places firewall at every connection point.
50
Packet
Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model.
51
Payload
The primary action of a malicious code attack.
52
Platform as a Service (PaaS)
The web-authoring or application development middleware environment that allows applications to be built in the cloud before they're deployed as SaaS assets.
53
Payment Card Industry Data Security Standard (PCI DSS)
An information security standard administered by the Payment Card Industry Security Standards Council that applies to merchants and service providers who process credit or debit card transactions.
54
Simple Mail Transport Protocol (SMTP)
Simple Mail Transport Protocol (SMTP) The standard communication protocol for sending and receiving emails between senders and receivers.
54
Software as a Service (SaaS)
The cloud customer uses the cloud provider's applications running within a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings
54
Spoofing
Faking the sending address of a transmission to gain illegal entry into a secure system
54
VLAN
VLAN A virtual local area network (VLAN) is a logical group of workstations, servers, and network devices that appear to be on the same LAN despite their geographical distribution.
54
Transport Control Protocol/Internet Protocol (TCP/IP) Model
Internetworking protocol model created by the IETF, which specifies four layers of functionality: Link layer (physical communications), Internet Layer (network-to-network communication), Transport Layer (basic channels for connections and connectionless exchange of data between hosts), and Application Layer, where other protocols and user applications programs make use of network services.
54
VPN
A virtual private network (VPN), built on top of existing networks, that can provide a secure communications mechanism for transmission between networks.
54
Zenmap
The graphical user interface (GUI) for the Nmap Security Scanner, an open-source application that scans networks to determine everything that is connected as well as other information.
54
WLAN
A wireless area network (WLAN) is a group of computers and devices that are located in the same vicinity, forming a network based on radio transmissions rather than wired connections. A Wi-Fi network is a type of WLAN.
54
Zero Trust
Removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset. Microsegmentation of workloads is a tool of the model.
55
Network model upper layer
Application, layers 5-7
56
Network model lower layer
Data transport, layers 1-4
57
Network model layer 1
Physical layer
58
Network model layer 2
Data link
59
Network model layer 3
Network
60
Network model layer 4
Transport
61
Network model layer 5
Session
62
Network model layer 6
Presentation
63
Network model layer 7
Application
64
What is the primary responsibility of the upper layer (host or application layer) in a network model?
Transforming data into a format that any system can understand
65
Which layer of the OSI model corresponds to the Internet Layer in the TCP/IP protocol architecture?
Network Layer
66
What protocol is often used by embedded systems when connected to a corporate network?
TCP/IP
67