Network Security Fundamentals Flashcards

(95 cards)

1
Q

What is the CIA Triad?

A

Confidentiality, Integrity, Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Confidentiality ensure?

A

Data is kept private and secure from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is Confidentiality implemented?

A

Through encryption and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Symmetric Encryption?

A

Uses the same key for encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of symmetric encryption?

A

AES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Main challenge with symmetric encryption?

A

Key distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Asymmetric Encryption?

A

Uses a key pair: public and private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Example of asymmetric encryption?

A

RSA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does HTTPS use asymmetric encryption?

A

To exchange symmetric keys securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does Integrity ensure?

A

Data has not been altered or tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is Integrity enforced?

A

Hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Example of hashing algorithms?

A

MD5, SHA-256.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Availability?

A

Ensuring data and services are accessible when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is Availability ensured?

A

Redundancy and high availability design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Example threats to Availability?

A

DDoS, hardware failure, power outage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a threat in cybersecurity?

A

A person, event, or condition with potential to cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a vulnerability?

A

A weakness that can be exploited by a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When does risk exist?

A

When both a threat and a vulnerability are present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Examples of internal threats?

A

Malicious employee, accidental actions by staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Examples of external threats?

A

Hackers, natural disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Examples of environmental vulnerabilities?

A

Floods, power outages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Examples of physical vulnerabilities?

A

Unlocked doors, poor cable management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Examples of operational vulnerabilities?

A

Poor policies, lack of enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Examples of technical vulnerabilities?

A

Outdated software, misconfigured firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is CVE?
Common Vulnerabilities and Exposures, a public list of known technical flaws.
26
What is a Zero-Day vulnerability?
An unknown flaw with no patch at time of discovery.
27
What is an exploit?
Code or technique used to take advantage of a vulnerability.
28
How do attackers exploit vulnerabilities?
Use exploit code to gain access or execute commands.
29
Mitigation for vulnerabilities?
Patch systems, update software, use firewalls, enforce access control.
30
What is risk management?
Identifying, evaluating, and mitigating risks.
31
Real-life example of risk management?
Locking your doors at night.
32
What is a threat assessment?
Identifying possible threats to a network.
33
What is a vulnerability assessment?
Identifying weaknesses in systems or networks.
34
What is a penetration test?
Simulated attack to exploit vulnerabilities.
35
What is a posture assessment?
Holistic evaluation of an organization’s cyber readiness.
36
What is a process assessment?
Reviews internal operations for effectiveness.
37
What is a vendor assessment?
Evaluates third-party vendors for security and reliability.
38
What is PCI DSS?
A standard for protecting credit card data.
39
Who must comply with PCI DSS?
Any organization handling credit card data.
40
What is GDPR?
EU regulation on data protection and privacy.
41
Who must comply with GDPR?
Any organization dealing with EU citizens' data.
42
What are GDPR user rights?
Access, rectification, erasure, restriction.
43
What is data locality?
Where data is stored and processed geographically.
44
What is continuous auditing?
Ongoing monitoring to ensure compliance.
45
Why is employee training important for compliance?
Helps avoid breaches and legal issues.
46
What is device hardening?
Securing a system by reducing its attack surface.
47
Examples of device hardening?
Disable ports/services, change default passwords, install anti-malware.
48
What is patch management?
Keeping systems updated with latest fixes.
49
What is baseline configuration?
Standardized OS images and security settings.
50
What is a host-based firewall?
Local firewall to control inbound/outbound traffic.
51
What is full-disk encryption?
Encrypts entire storage drive to protect data at rest.
52
What is account cleanup?
Removing unused or default accounts.
53
What is EOL (End of Life)?
Product no longer sold or licensed.
54
What is EOS (End of Support)?
No updates or vendor support available.
55
Why avoid EOL/EOS systems?
They are unpatched and vulnerable.
56
What is the principle of least functionality?
Only enable what's necessary for a system's purpose.
57
Why disable unnecessary services?
To reduce attack surface and improve performance.
58
How to disable services in Windows?
Use services.msc or command line (sc/net stop).
59
How to manage services in macOS?
Use Activity Monitor or Terminal.
60
How to kill processes in Linux/macOS?
Use top command, find PID, then kill.
61
Why use host-based firewalls?
To control traffic and block unused ports.
62
What is physical security in cybersecurity?
Protecting physical access to devices and data.
63
What are detective physical controls?
Cameras, motion sensors, tamper alerts.
64
What are preventive physical controls?
Locks, biometric readers, mantraps.
65
What is a mantrap?
A secure two-door entry system.
66
What is badge access control?
Uses ID cards or RFID for physical entry.
67
What are smart lockers?
Secure storage for mobile devices in sensitive areas.
68
Why train employees on physical security?
To prevent social engineering and policy violations.
69
What is active defense in cybersecurity?
Engaging or deceiving attackers proactively.
70
What is a honeypot?
A fake system set up to lure and analyze attackers.
71
What is a honeynet?
A network of honeypots mimicking a real environment.
72
Purpose of honeypots/honeynets?
Divert attackers and gather intelligence.
73
What is threat attribution?
Identifying who is behind an attack.
74
What are deception strategies?
Techniques like fake DNS, bogus files, non-standard ports.
75
What is port spoofing?
Faking port responses to confuse attackers.
76
What is 'hack back'?
Retaliatory cyber action against attackers.
77
Is hack back legal?
No, it's generally illegal and discouraged.
78
Key takeaway about deception?
Useful for learning about attackers, not defense.
79
Summary of CIA Triad?
Confidentiality (keep secret), Integrity (unaltered), Availability (always accessible).
80
What does network segmentation do?
Divides networks to contain breaches.
81
What is IDS?
Intrusion Detection System - monitors for suspicious activity.
82
What is IPS?
Intrusion Prevention System - blocks detected threats.
83
What is the role of firewalls?
Enforce network traffic rules.
84
Why enforce password policies?
To prevent unauthorized access.
85
Why restrict USB device access?
To block potential malware entry.
86
Why log network events?
For auditing and incident response.
87
Why use standard OS images?
For consistency and security across systems.
88
Why are vulnerability scans important?
To identify weaknesses before attackers do.
89
What is a Data Protection Officer (DPO)?
Role required under GDPR for overseeing compliance.
90
What is a DPIA?
Data Protection Impact Assessment - analyzes risks in data handling.
91
What is anti-malware software?
Protects against malicious software threats.
92
Why limit command-line access?
To reduce risk of system misuse or misconfiguration.
93
What is network hardening?
Securing network infrastructure (routers, switches).
94
Why use VLANs?
To segment and isolate traffic in networks.
95
What is network access control (NAC)?
Ensures only authorized devices can connect to the network.