Networks and Network Security Flashcards

(71 cards)

1
Q

Active packet sniffing

A

an attack where data packets are manipulated in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Address Resolution Protocol (ARP

A

Use to determine the MAC address of the next router or device to traverse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bandwidth

A

The maximum data transmission capacity over a network, measured by bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Baseline configuration

A

A documented set of specifications within a system that is used as a basis for future builds, releases, and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bluetooth

A

Used for wireless communication with nearby physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Botnet

A

A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot herder”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud-based firewalls

A

Software firewalls that are hosted by the cloud service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud computing

A

The practice of using remote servers, application, and network services that are hosted on the internet instead of on local physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud network

A

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Controlled zone

A

A subnet that protects the internal network from the uncontrolled zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data packet

A

A basic unit of information that travels from one device to another within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of service (DoS) attack

A

An attack that targets a network or server and floods it with network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Domain Name System (DNS)

A

A networking protocol that translates internet domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encapsulation

A

A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

File Transfer Protocol (FTP)

A

Used to transfer files from one device to another over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewall

A

A network security device that monitors traffic to or from your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Forward proxy server

A

A server that regulates and restricts a person’s access to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hardware

A

The physical components of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hub

A

A network device that broadcasts information to every device on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hypertext Transfer Protocol (HTTP)

A

An application layer protocol that provides a method of communication between clients and website servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hypertext Transfer Protocol Secure (HTTPS)

A

A network protocol that provides a secure method of communication between clients and servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identity and access management (IAM)

A

A collection of processes and technologies that helps organizations manage digital identities in their environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IEEE 802.11 (Wi-Fi)

A

A set of standards that define communication for wireless LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Internet Control Message Protocol (ICMP)

A

An internet protocol used by devices to tell each other about data transmission errors across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Internet Control Message Protocol (ICMP) flood
A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server
26
Internet Protocol (IP)
A set of standards used for routing and addressing data packets as they travel between devices on a network
27
Internet Protocol (IP) address
A unique string of characters that identifies the location of a device on the internet
28
IP spoofing
A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network
29
Local area network (LAN)
A network that spans small areas like an office building, a school, or a home
30
Media Access Control (MAC) address
A unique alphanumeric identifier that is assigned to each physical device on a network
31
Modem
A device that connects your router to the internet and brings internet access to the LAN
32
Multi-factor authentication (MFA)
A security measure that requires a user to verify their identity in two or more ways to access a system or network
33
Network
A group of connected devices
34
Network log analysis
The process of examining network logs to identify events of interest
35
Network protocols
A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data
36
Network segmentation
A security technique that divides the network into segments
37
Operating system (OS)
The interface between computer hardware and the user
38
Open systems interconnection (OSI) model
A standardized concept that describes the seven layers computers use to communicate and send data over the network
39
On-path attack
An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit
40
Packet sniffing
The practice of capturing and inspecting data packets across a network
41
Passive packet sniffing
A type of attack where a malicious actor connects to a network hub and looks at all traffic on the network
42
Patch update
A software and operating system update that addresses security vulnerabilities within a program or product
43
Penetration testing
A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes
44
Ping of death
A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB
45
Port
A software-based location that organizes the sending and receiving of data between devices on a network
46
Port filtering
A firewall function that blocks or allows certain port numbers to limit unwanted communication
47
Proxy server
A server that fulfills the requests of its clients by forwarding them to other servers
48
Replay attack
A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time
49
Reverse proxy server
A server that regulates and restricts the Internet's access to an internal server
50
Router
A network device that connects multiple networks together
51
Secure File Transfer Protocol (SFTP)
A secure protocol used to transfer files from one device to another over a network
52
Secure shell (SSH)
A security protocol used to create a shell with a remote system
53
Security hardening
The process of strengthening a system to reduce its vulnerabilities and attack surface
54
Security information and event management (SIEM)
An application that collects and analyzes log data to monitors critical activities for an organization
55
Security zone
A segment of a company’s network that protects the internal network from the internet
56
Simple Network Management Protocol (SNMP)
A network protocol used for monitoring and managing devices on a network
57
Smurf attack
A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with ICMP packets
58
Speed
The rate at which a device sends and receives data, measured by bits per second
59
Stateful
A class of firewall that keeps track of information passing through it and proactively filters out threats
60
Stateless
A class of firewall that operates based on predefined rules and that does not keep track of information from data packets
61
Subnetting
The subdivision of a network into logical groups called subnets
62
Switch
A device that makes connections between specific devices on a network by sending and receiving data between them
63
Synchronize (SYN) flood attack
A type of DoS attack that simulates a TCP/IP connection and floods a server with SYN packets
64
TCP/IP model
A framework used to visualize how data is organized and transmitted across a network
65
Transmission Control Protocol (TCP)
An internet communication protocol that allows two devices to form a connection and stream data
66
Transmission control protocol (TCP) 3-way handshake
A three-step process used to establish an authenticated connection between two devices on a network
67
Uncontrolled zone
The portion of the network outside the organization
68
User Datagram Protocol (UDP)
A connectionless protocol that does not establish a connection between devices before transmissions
69
Virtual Private Network (VPN)
A network security service that changes your public IP address and masks your virtual location so that you can keep your data private when you are using a public network like the internet
70
Wide Area Network (WAN)
A network that spans a large geographic area like a city, state, or country
71
Wi-Fi Protected Access (WPA)
A wireless security protocol for devices to connect to the internet