Jose 4 5 Flashcards

(93 cards)

1
Q

It helps vendors and developers create interoperable network devices and software.

A

Standardization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It gives network engineers a clear structure to isolate and fix issues.

A

Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It simplifies the complexity of networking into digestible parts.

A

Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is the protocol suite that runs the internet, intranets, and most local networks today.

A

TCP/IP (Transmission Control Protocol/Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A cyber attack aimed at making a computer or device unavailable to its intended users by interrupting normal functioning, typically by overwhelming it with requests.

A

Denial-of-Service (DoS) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Exploit memory buffer vulnerabilities, consuming resources like hard disk space or CPU time, causing system slowdowns or crashes.

A

Buffer Overflow Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Overwhelm the target with excessive network packets, using more bandwidth than the target can handle, causing service denial.

A

Flood Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Involves using a broadcast address to send spoofed packets, flooding the target IP address.

A

Smurf Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Overwhelms a target with excessive ICMP (ping) packets, disrupting its ability to respond efficiently.

A

Ping Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sends a malformed packet that causes system crashes or other harmful behaviors.

A

Ping of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An attack that attempts to disrupt an online service by flooding it with traffic from one source.

A

DoS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attack that aims to disrupt an online service by flooding it with traffic from multiple sources.

A

DDoS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hacker secretly intercepting or altering communication between two parties to steal data without their knowledge.

A

Man-in-the-Middle (MitM) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hackers impersonate banks or companies via email to steal data or money.

A

Email Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fake public Wi-Fi networks used to spy on users and steal sensitive data.

A

Wi-Fi Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Redirects users to fake websites to steal login credentials.

A

DNS Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Steals session cookies after login to hijack user sessions.

A

Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Exploits outdated SSL protocols to intercept encrypted data.

A

SSL Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Sends fake ARP messages to reroute traffic through the attacker’s device.

A

ARP Cache Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Fakes IP addresses to trick users into visiting malicious sites.

A

IP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Accesses browser cookies (with other methods) to steal passwords or credit card info.

A

Cookie Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A network security tool that controls incoming and outgoing traffic based on predefined security rules, acting as a checkpoint between trusted internal networks and potential external threats.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A system that detects potential threats and vulnerabilities by monitoring network traffic and alerting administrators without interfering with data flow.

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Monitors traffic across the entire network.

A

Network-based IDS (NIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Runs on individual devices to monitor system-level activities.
Host-based IDS (HIDS)
26
Monitors specific protocols at the transport layer.
Protocol-based IDS (PIDS)
27
Focuses on traffic specific to applications.
Application Protocol-based IDS (APIDS)
28
Combines features from multiple IDS types for broader coverage.
Hybrid IDS
29
Detects threats by comparing traffic against known attack patterns.
Signature-based IDS
30
Identifies deviations from normal behavior, flagging unusual activity that may indicate a new or unknown threat.
Anomaly-based IDS
31
A security tool that actively analyzes and blocks malicious traffic in real time, positioned inline with network traffic.
Intrusion Prevention System (IPS)
32
Recognizes known threats using a database of attack patterns.
Signature-based detection (IPS)
33
Compares network activity against a baseline of normal behavior to detect deviations.
Anomaly-based detection (IPS)
34
Uses custom rules set by administrators to enforce specific security protocols.
Policy-based detection (IPS)
35
Unauthorized users connecting to your network and potentially engaging in illegal activities or stealing information.
Piggybacking
36
Attackers driving around looking for unsecured networks to exploit.
Wardriving
37
Attackers mimicking a legitimate Wi-Fi access point to steal personal data from unsuspecting users.
Evil Twin Attack
38
Unencrypted public Wi-Fi exposing sensitive data like passwords and credit card numbers.
Wireless Sniffing
39
Exposure of files and directories if file sharing is enabled on an unsecured network.
Unauthorized Computer Access
40
Attackers stealing sensitive data by observing what you type in public spaces.
Shoulder Surfing
41
Physical theft of devices leading to potential data exposure.
Theft of Mobile Devices
42
Replace default passwords to prevent easy access to your network.
Change Default Passwords
43
Use MAC address filtering and guest networks to control who can connect.
Restrict Access
44
Use WPA2 or WPA3 encryption to protect data transmitted over your network.
Encrypt Data
45
Avoid broadcasting your network name and use a unique SSID to make it harder for attackers to find.
Protect SSID
46
Use both network-based and host-based firewalls to add layers of protection.
Install Firewalls
47
Keep antivirus software updated to protect against malicious software.
Maintain Antivirus Software
48
Disable file sharing when not needed and protect shared files with passwords.
Use File Sharing Cautiously
49
Regularly check for software updates or patches for your router.
Update Access Point Software
50
Consult your ISP or router manufacturer for recommended security settings.
Check Security Options
51
It addresses minor bugs and serious vulnerabilities, preventing exploitation.
Application Security (AppSec)
52
Updating software, drivers, and firmware to fix vulnerabilities and enhance system performance.
Patch Management
53
Up-to-date systems function more reliably, helping employees work more efficiently.
Improves Productivity
54
Remote patching tools minimize the need for on-site repairs, especially for remote workforces.
Reduces Costs
55
Patch management aids in meeting data protection laws such as HIPAA and GDPR by ensuring systems stay secure.
Supports Compliance
56
Include firmware and driver updates to address risks across the full computing stack.
Go Beyond Software Updates
57
Establish and communicate a consistent patching cycle to reduce disruption and improve preparedness.
Create a Regular Schedule
58
Apply patches to a small user group first to identify any issues before a company-wide rollout.
Test Before Full Deployment
59
IT managers typically oversee patch deployment, but in smaller setups, users may handle updates themselves.
Define Responsibilities
60
Use software like Microsoft Endpoint Configuration Manager to manage and automate patching remotely and at scale.
Use Patch Management Tools
61
Integrates security into every phase of the software development process.
Secure Software Development Lifecycle (SSDLC)
62
Identify security requirements and potential risks, using threat modeling to foresee attack paths.
Planning (SSDLC phase)
63
Apply least privilege, defense in depth, and secure design patterns during system structure creation.
Architecture & Design (SSDLC phase)
64
Follow secure coding standards, conduct code reviews, static analysis, and use automation tools.
Development (SSDLC phase)
65
Perform SAST, DAST, and penetration testing to simulate real attacks and validate security controls.
Testing & Verification (SSDLC phase)
66
Use Infrastructure as Code, implement secrets management, and ensure compliant deployments.
Deployment (SSDLC phase)
67
Conduct regular patching and logging, and implement incident response plans.
Maintenance & Monitoring (SSDLC phase)
68
Embed security into DevOps practices as a shared responsibility for fast and secure development cycles.
Integration with DevOps (SSDLC phase)
69
Apply security early in development (coding/build).
Shift Left
70
Continue testing and monitoring in production.
Shift Right
71
Automate security checks to avoid slowing down development.
Automate Security Checks
72
Promote developer security training and teamwork.
Developer Security Training and Teamwork
73
Secure by default with least privilege, access control, and encryption in containerized environments.
Security for Containers & Microservices
74
Protection of physical devices from threats that enable unauthorized system access, including physical security and cryptographic protection.
Hardware Security
75
Attacks can come via internal actors, misconfigurations, or malicious hardware, making device-level protection critical.
Why Hardware Security Matters
76
Outdated firmware with bugs and flaws due to poor patching.
Outdated Firmware
77
Inadequate encryption leaving data at rest or in motion unprotected.
Inadequate Encryption
78
Poorly protected local ports or interfaces that allow unauthorized access.
Unsecured Local Access
79
Easy for attackers to guess or find default passwords on hardware devices.
Unchanged Default Passwords
80
Security gaps in tailor-made devices.
Vulnerable Custom Hardware
81
Hidden access intentionally built into hardware.
Backdoors
82
Data capture from compromised devices.
Eavesdropping
83
Tampering to control or alter hardware behavior.
Modification Attacks
84
Induced malfunctions for exploitation.
Triggering Faults
85
Fake or altered hardware with built-in threats.
Counterfeit Hardware
86
Investigate manufacturers, their partners, and supply chains before acquisition.
Vet Hardware Suppliers
87
Use full-spectrum encryption at rest, in transit, and during processing.
Encrypt Everything
88
Disable unused ports/interfaces and fix misconfigurations to reduce potential entry points.
Minimize Attack Surface
89
Use secure elements, authenticators, and tamper detection switches to strengthen electronic security.
Strengthen Electronic Security
90
Lock BIOS, firewall configurations, servers, and use surveillance for protection.
Ensure Strong Physical Security
91
Use cloud-based tools for alerts, automation, and device discovery to monitor hardware in real time.
Implement Real-Time Monitoring
92
Perform vulnerability testing, physical inspections, and even X-rays when needed.
Conduct Regular Audits
93
A conceptual framework that standardizes network functions into seven layers.
Open Systems Interconnection (OSI) Model