Flashcards for Section 4.0 - Network Security

(77 cards)

1
Q

What is the CIA Triad?

A

Confidentiality, Integrity, and Availability; a model to guide security policies ensuring data protection, accuracy, and accessibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Confidentiality in the CIA Triad?

A

Ensuring data is accessible only to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Integrity in the CIA Triad?

A

Maintaining data accuracy and trustworthiness, preventing unauthorized modifications, using hashing or checksums.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Availability in the CIA Triad?

A

Ensuring data and systems are accessible to authorized users when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the principle of least privilege?

A

Granting users only the access necessary for their tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is separation of duties?

A

Dividing tasks among multiple users to prevent fraud or errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is zero trust?

A

A security model requiring continuous verification of all users and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is defense in depth?

A

A layered security approach using multiple controls (e.g., firewalls, IDS, encryption) to protect against threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is defense in depth effective?

A

Multiple layers ensure that if one control fails, others can still protect the network, reducing single points of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is multifactor authentication (MFA)?

A

Requiring two or more authentication factors (e.g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is single sign-on (SSO)?

A

Allowing users to authenticate once and access multiple systems without re-authenticating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is RADIUS in authentication?

A

Remote Authentication Dial-In User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is LDAP in authentication?

A

Lightweight Directory Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is risk management in networking?

A

Identifying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a risk assessment?

A

Evaluating potential threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is risk mitigation?

A

Implementing controls (e.g., firewalls, patches) to reduce the likelihood or impact of risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Denial of Service (DoS) attack?

A

Overwhelms a network or system with traffic to disrupt service availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Distributed Denial of Service (DDoS) attack?

A

A DoS attack using multiple compromised devices (botnets) to flood a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an on-path attack?

A

An attack where an attacker intercepts and potentially alters communication between two parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is ARP spoofing?

A

An on-path attack where an attacker sends fake ARP messages to associate their MAC address with a legitimate IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is VLAN hopping?

A

An attack exploiting misconfigured VLANs to access unauthorized VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How can VLAN hopping be prevented?

A

Disable unused ports, use non-default VLANs, and configure trunk ports to allow only specific VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is spoofing in networking?

A

Falsifying data to appear as a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is IP spoofing?

A

Forging the source IP address in packets to hide the attacker’s identity or impersonate a trusted host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is MAC spoofing?
Changing a device’s MAC address to impersonate another device
26
What are rogue services?
Unauthorized services (e.g., rogue DHCP servers, access points) running on a network, posing security risks.
27
How can rogue DHCP servers be detected?
Use DHCP snooping on switches to filter unauthorized DHCP responses and monitor for unexpected IP assignments.
28
What is malware?
Malicious software (e.g., viruses, worms, trojans) designed to harm, steal data, or disrupt systems.
29
What is ransomware?
Malware that encrypts data
30
What is a password attack?
Techniques like brute force or dictionary attacks to guess or crack passwords and gain unauthorized access.
31
What is a brute force attack?
Systematically trying all possible password combinations until the correct one is found
32
What is a dictionary attack?
Using a list of common words or phrases to guess passwords
33
What is a deauthentication attack?
A wireless attack sending deauth frames to disconnect devices from a Wi-Fi network
34
How can deauthentication attacks be mitigated?
Use 802.11w (protected management frames), monitor for attack patterns, or upgrade to newer Wi-Fi standards.
35
What is social engineering?
Manipulating people to disclose sensitive information or perform actions
36
What is phishing?
A social engineering attack using fraudulent emails or messages to trick users into revealing credentials or installing malware.
37
What is network hardening?
Applying security measures to reduce vulnerabilities, like disabling unused services, updating firmware, and securing configurations.
38
Why is disabling unused services important?
Reduces attack surfaces by eliminating unnecessary ports or protocols that could be exploited.
39
What is the importance of changing default passwords?
Prevents attackers from using known default credentials
40
What is password complexity in network hardening?
Using strong passwords (mixed case, special characters, long length) to resist guessing or brute-force attacks.
41
Why change the default VLAN?
Prevents users from accessing the management VLAN
42
What is the role of firmware upgrades in hardening?
Patches security vulnerabilities in network devices
43
What is patch management in network hardening?
Regularly applying updates (service packs, monthly patches, emergency fixes) to ensure system stability and security.
44
What is role-based access in network hardening?
Assigning specific permissions based on user roles (e.g.
45
What are access control lists (ACLs)?
Rules allowing or denying traffic based on criteria like IP, port, or time, used to restrict unauthorized access.
46
What are firewall rules in network hardening?
Policies managing traffic, often with implicit deny, logging explicit denies to detect reconnaissance attempts.
47
What is MAC filtering in wireless security?
Limiting access by allowing only specific MAC addresses
48
What is antenna placement in wireless security?
Positioning antennas to focus coverage and limit external access
49
What is wireless isolation?
Preventing wireless clients on the same access point from communicating
50
What is guest network isolation?
Ensuring guest Wi-Fi cannot access the internal private network
51
What is WPA2-Personal?
Wi-Fi Protected Access 2 with a pre-shared key
52
What is WPA3-Enterprise?
Wi-Fi security using 802.1X authentication with individual credentials via a server (e.g.
53
What is EAP in wireless security?
Extensible Authentication Protocol
54
What is geofencing in wireless security?
Restricting or allowing device features (e.g., camera, login) based on geographic location, often via MDM.
55
What is a captive portal?
A web page requiring authentication (e.g.
56
What is IoT security in wireless networks?
Segmenting IoT devices on a separate VLAN or guest network to protect private data from potential breaches.
57
What is a VPN?
Virtual Private Network
58
What is a site-to-site VPN?
Encrypts traffic between two network sites over the internet
59
What is a host-to-site VPN?
Allows remote users to securely access a network via client software
60
What is a clientless VPN?
Uses HTML5 and web browsers to create a VPN tunnel without dedicated software
61
What is a remote desktop connection?
Allows sharing a desktop remotely, using protocols like RDP or VNC, often for technical support.
62
What is a remote desktop gateway?
Combines VPN and RDP to securely access internal RDP servers via an SSL tunnel, acting as a proxy.
63
What is SSH in remote access?
Secure Shell
64
Why is authentication critical for remote access?
Prevents unauthorized access, requiring strong credentials and MFA, as seen in breaches like the 2008 Subway incident.
65
What is out-of-band management?
Accessing devices via a separate management interface (e.g., serial, modem) when the network is unavailable.
66
What is video surveillance in physical security?
Using CCTV cameras to monitor facilities, replacing guards, with features like motion detection and low-light capability.
67
What are asset tracking tags?
Tags (e.g., barcode, RFID) on equipment to track location, configuration, and financial details for audits.
68
What is tamper detection?
Mechanisms like case sensors or foil tags to detect unauthorized access to hardware, triggering alarms.
69
What is employee training for physical security?
Educating staff on security practices via one-on-one sessions, posters, or intranet pages to prevent breaches.
70
What is access control hardware?
Purpose-built devices like gates, locks, and cameras, often networked for real-time monitoring and control.
71
What are badge readers?
Electronic keyless systems using PINs or cards
72
What is biometric authentication?
Using unique traits (e.g., fingerprint, iris) for access, storing mathematical representations, not easily changed.
73
What are access control vestibules?
Secure entry systems where opening one door locks others
74
What are locking cabinets?
Enclosed data center racks with locks to secure hardware, managed by owners, with ventilation for cooling.
75
What are smart lockers?
Automated lockers for secure package delivery, using PINs or apps to prevent theft and track access.
76
What is data destruction in physical security?
Securely disposing of media to prevent data leaks, using physical destruction or sanitization for reuse.
77
What is media sanitization?
Wiping or resetting storage devices to remove data