Network Security Flashcards

1
Q

What is the abbreviation for information security?

A

InfoSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the abbreviation for security operations?

A

SecOps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a person, device, information or locations that SecOps aims to protect from attack

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an action taken by a threat that exploits a vulnerability?

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the potential of a threat to exploit a vulnerability?

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the abbreviation for IT security operations responsible for protecting assets by reducing the risk of attacks?

A

SecOps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is something or someone that can exploit a vulnerability to attack an assett?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a weakness in software, hardware, facilities or humans that can be exploited by a threat?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an indispensable tool for detecting vulnerabilities within servers, computers and network devices?

A

Vulnerability Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You need to protect your assets from both what?

A

Physical and electronic security matters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blank that aren’t changed in network devices are easy to find online for an attacker

A

Default passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What unleashes a multitude of viruses or malware or ransomware into a network from one seemingly innocuous computer?

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a virus laying in wait for some preordained time or a trigger to release its attack?

A

Advanced Persistent Threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the real danger of an APT attack?

A

Backups are infected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the term for an exploit or vulnerability that is not yet known to the public, so there is no patch available to mitigate it.

A

Zero Day Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who allows administrators to forward unknown or suspicious code patterns for analysis?

A

Intrusion Prevention System (IPS) vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who is tasked with attempting to compromise a network’s security?

A

Penetration tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who is responsible for scanning servers and network devices for known vulnerabilities?

A

Vulnerability tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is nessus.com

A

Vulnerability scanning tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which team attempts to compromise the security?

A

Red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which team attempts to defend a network’s security?

A

Blue team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which team is the continuous improvement team that debrief and cross-train each other after an attack?

A

Purple team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Who are IT professionals who specialize in penetrating or compromising network security but only to help improve its own security posture?

A

White hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Who possess the knowledge and will to breach systems for profit?

A

Black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Who have no permission to attack a network, but they have no malicious intent?

A

Grey hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the key to preventing insider threats?

A

Minimum set of permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the term for intellectual property theft by nation states with large budgets?

A

Industrial espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Who are copycat criminals of the hacker world who hack out of curiosity with a lack of knowledge?

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the term for someone or something that can exploit a vulnerability to attack an asset?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which attack comes from the historical technique that allows the attacker to eavesdrop a conversation between two humans or two computers?

A

Wiretapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a device called that listens and records traffic on the network?

A

Packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are fiber optic cables immune to attack-wise?

A

EMF listening devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the term for an application that can systematically check each port by sending thousands of TCP/IP packets to the victim’s computer?

A

Port scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a popular target of attacks because they typically contain high-value information?

A

Database servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When the attacker knows what ports are accepting traffic, they can run what against the victim’s computer to see if any of the services can be easily exploited?

A

Vulnerability scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What type of attack allows an attacker to take control of a database server by inserting special commands into input boxes instead of entering basic text?

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What type of attack is made possible by applications that do not properly validate user input for extraneous content. The attacker purposefully enters text that is too large to fit within a region of memory

A

Buffer overflow

38
Q

Reviewing your source code and enabling the NX-bit (no execute functionality on the computer are two ways to prevent what type of attack?

A

Take control attack

39
Q

What attack is made more difficult by advances in networking, like the Ethernet switch?

A

Spoofing

40
Q

What is the term for an attacker impersonating the sender and receiver of network traffic?

A

Spoofing the identinty

41
Q

Which attack wants to intercept the communication between a client computer and a server?

A

Man in the middle attack

42
Q

What attack is used to cause an Ethernet switch to flood all traffic to every port of the switch?

A

ARP poisoning

43
Q

What is the term for an attack that overwhelms a victim’s computer wit enormous amounts of useless traffic?

A

Denial of Service (DOS) attack

44
Q

What attack would send the victim malformed ICMP packet that would cause it to crash?

A

Ping of death

45
Q

What attack overwhelms a victim’s computer with an immense volume of ICMP packets all containing a forged, randomized service address?

A

Ping flood

46
Q

Which attack is a distributed DoS attack in which the attacker sends an ICMP echo request to a large IP subnet specifying the victim’s address as the source address?

A

Smurf attack

47
Q

What attack causes the victim’s computer to consume excessive CPU time as is constantly sets up and tears down thousands of encrypted sessions over and over again?

A

SSL attack

48
Q

What is the act of manipulating human users to gain access or information?

A

Hacking a human

49
Q

What is the act of pretending to be an employee or vendor in order to gain access to the network?

A

Impersonating

50
Q

What is the social engineering attack that gets information voluntarily from the victim through email or phone?

A

Phishing

51
Q

What is the term for a server or device that is configured to appear to have legitimate data?

A

Honey pot

52
Q

Honeypot is also known as what?

A

tar pit

53
Q

The goal of what is to provide a false positive for the attacker and make them believe the fake data is real.

A

Honey pot

54
Q

What can contain tracking information that can be obtained by the intrusion detection system in order to collect data on the attacker?

A

Tar pit server

55
Q

The best way to secure the network is use what in a what manner?

A

Multiple tools; overlapping

56
Q

What does IPS stand for?

A

Intrusion Prevention System

57
Q

Minimize exposure to attack by keeping your what up to date

A

patches

58
Q

What guides help you remove unnecessary services & features that may be susceptible to attack?

A

Security-hardening

59
Q

You should test and develop what before a virus attack occurs?

A

Containment plans

60
Q

Run blank on your system regularly and keep the virus definition up-to-date as possible to help you detect new and emerging threats

A

antivirus and anti-malware scans

61
Q

What does CIA stand for?

A

Confidentiality, Integrity, Availability

62
Q

What in the CIA triad limits access?

A

Confidentiality

63
Q

What in the CIA triad enables you to trust the information?

A

Integrity

64
Q

What in the CIA triad ensures you have access to the information?

A

Availability

65
Q

Blank is critical in security management. Some orgs create specific classifications for their data that define different sensitivity levels, each with specific policies

A

Consistency

66
Q

The goal of what in the CIA triad is to prevent an unauthorized user from accessing, copying, or transmitting the information

A

Confidentiality

67
Q

Confidentiality is often equated to what?

A

Privacy

68
Q

What ensures that only the intended recipient of the information can access it, following a need-to-know policy and destroying all copies that are no longer needed.

A

Privacy

69
Q

Blank information is easy to steal and change

A

Unencrypted

70
Q

Blank files are rarely purged from a disk immediately and often can be recovered with ease

A

Deleted

71
Q

Blank of a device gives an attacker unlimited time to break an encryption

A

Physical theft

72
Q

Blank is a method to gain a victim’s trust to provide information

A

Social Engineering

73
Q

Blank is like storing files in the wrong location

A

Accidents & Malfunctions

74
Q

Encrypt the blank (where it is stored) and blank (where it is moving across the network)

A

Information-at-rest
Information-in-transit

75
Q

What describes data where it is stored?

A

At-rest

76
Q

What describes data moving across the network?

A

In-transit

77
Q

Blank makes it possible to identify where information came from and if the data has changed since it was originally sent

A

Integrity

78
Q

Blank works well with confidentiality

A

Integrity

79
Q

Blank attacks can compromise integrity

A

Man-in-the-middle attacks

80
Q

Intentional or unintentional blank can or modifications can compromise integrity

A

Deletion

81
Q

Blank in equipment can cause data corruption

A

Malfunction

82
Q

Blank such as an EMP attack can destroy or severely corrupt data

A

Natural phenomena

83
Q

You should require all data transmissions to use blank or blank to confirm identity

A

Encryption; data signatures

84
Q

Blank, such as SHA-3, can be used to verify that the data has not changed

A

One-way hash calculations

85
Q

Blank create a value that can be used to verify the data has not changed

A

SHA-3

86
Q

Use blank with your data storage to quickly revert accidental changes or deletions

A

Version control

87
Q

You can blank to server solutions by carefully managing your app updates and patches

A

High availability

88
Q

Blank attacks prevent legitimate users from accessing resources

A

DoS and distributed DoS

89
Q

Accidental changes to blank can remove access for authorized users

A

Access control lists

90
Q

You should create and maintain a blank that includes a full site failover as well as the method to restore data for individual servers

A

Full disaster recovery plan

91
Q

You should implement server what, using clustering tech where appropriate

A

High availability

92
Q

Setting up blank and storing a backup copy at another physical location protect against site-level disasters

A

regular backups