Network Security Flashcards

1
Q

Advanced Encryption Standard (AES)

A

uses 128, 192, 256 bit keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat

A

A person or event that has the potential for impacting a valuable resource in a negative manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerability

A

A quality or characteristic within a given resource or its environment that might allow the threat to be realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internal Threat

A

originates within the organization (most of the time employees or former employees)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

external threat

A

originates from outside the organization (hacker or environmental factor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical Vulnerabilities

A

unlocked doors, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Operational Vulnerabilities

A

Focuses on how the network and its systems are run from the perspective of an organization’s policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Technical Vulnerabilities

A

system specific conditions like outdates stuff that causes a vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CVE

A

list of vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

zero-day vulnerability

A

an unknown or new vulnerability that no one has discovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exploit

A

Takes advantage of a security flaw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk

A

Threats and vulnerabilities combined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk Assessment

A

identifies potential hazards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Posture Assessment

A

Assesses cyber risk posture and exposure to threats caused by misconfigurations and patching delays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Least Privilege

A

Only give what is necessary for the function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Role-based Access

A

add people into certain roles, and then they receive the permissions that are associated with that role (admin, hr, etc.)

17
Q

Defense in Depth

A

Cybersecurity approach in which a series of defensive mechanisms are layered in order to protect valuable data and information

18
Q

DMZ

A

A perimeter network that protects an organization’s internal local area network from untrusted traffic

19
Q

Screen Subnet

A

subnet in the network architecture that uses a single firewall with three interfaces to connect three dissimilar networks

20
Q

Something you know

A

knowledge factors

21
Q

Dictionary Attack

A

Guesses using a pre-configured list; don’t use anything that looks like a regular word

22
Q

Brute Force attack

A

gonna try every possible combination

23
Q

Hybrid Attack

A

Collection information about your life (like from social media) and then create a list based upon that

24
Q

Something you have

A

something in your possession; like a smartcard or something like that

25
Q

Something you are

A

inherence; fingerprints, retina, etc.

26
Q

Something you do

A

Action factor; draw a pattern, etc.

27
Q

Somewhere you are

A

location; geotagging, etc.

28
Q

Authenticate

A

when you verify you are who you say you are

29
Q

Local authentication

A

user name and password

30
Q

LDAP

A

database and directory service; communicates over port 389 secure is 636

31
Q

Kerberos

A

Focused on authentication and authorization within a Windows domain environment in active directory; secure to insecure

32
Q

RADIUS

A

Provides centralized administration of dial-up, VPN, and wireless network authentication; operates at layer 7; udp; usually on another server; port 1812

33
Q

TACACS+

A

Cisco proprietary version of radius; TACACS+ is tcp; must have port 49 open

34
Q

802.1x

A

a standardized framework that’s used for port-based authentication on both wired and wireless networks

35
Q

EAP

A

allows for numerous different mechanisms of authentication

36
Q

Network Access Control

A

Ensures a device is scanned to determine its current state of security prior to being allowed network access

37
Q

IEEE 802.1x

A

Used in port-based Network Access Control

38
Q

Rule-Based

A

follow a set of logical rules for access control