Networks and Network Security Flashcards

1
Q

What are networks?

A

A group of connected devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a LAN?

A

Local Area Network

a network that spans a small area life home, schools or office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a WAN?

A

Wide Area Network

a network that spans a wide geographic area like a city, state or country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a hub?

A

A network device that broadcast information to every device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a switch?

A

a device that make connections between specific devices on a network by sending and receiving data between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a router?

A

a network that connects multiple devices together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a modem?

A

It connects the router to the internet and brings internet access to the lan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a virtualization tool?

A

Pieces of software that performs network operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is cloud computing?

A

The practice of using remote servers, applications and network services that are hosted on the internet instead of on local physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a cloud network?

A

A collection of servers or computers that store resources and data in remote data centers that can be accessed via internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a data packet?

A

A basic unit information that travels from one device to another within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is bandwidth?

A

The amount of data a device receives every second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is speed?

A

The rate at which data packets are received or downloaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is packet sniffing?

A

The practice of capturing and inspecting data packets across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Transmission Control Protocol, also called TCP stands for what?

A

An internet communication protocol that allows two devices to form a connection and stream data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Internet Protocol, also called IP stands for what?

A

A set of standards used for routing and addressing data packets as they travel between devices on a networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a port?

A

a software based location that organizes sending and receiving of data between devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Port 25 is for what?

A

Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Port 443 is for what?

A

secured internet communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

port 20 is for what?

A

Large file transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the TCP/IP model?

A

a framework used to visualize how data is organized and transmitted across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the 4 layers of the TCP/IP Model?

A
  1. Network access layer
  2. Internet layer
  3. Transport layer
  4. Application layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The TCP/IP model is a condensed form of what model?

A

OSI Open systems interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How many layers is the OSI?

A

7 Layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is an IP address?
A unique string of characters that identifies the location a device on the internet
26
How many type of IP addresses are there?
2 IP Version 4 (IPv4) IP Version 6 (IPv6)
27
Example of IPv4?
19.117.63.126 smaller than IPv6
28
Example of IPv6
684D:1111:222:3333:4444:5555:6:77 consist of 32 characters larger than IPv4
29
What is a MAC address?
A unique alphanumeric identifier that is assigned to each physical device on an network.
30
What is a User Datagram Protocol (UDP)
A connectionless protocol that does not establish a connection between devices before transmissions
31
Network Protocols
A set of rules used by two or more devices on a network to describe the order of delivery and structure of the data.
32
Address resolution protocol (ARP)
a network protocol used to determine the MAC address of the next router or device on the path.
33
Hypertext transfer protocol Secure (HTTPS)
a network protocol that provides a secure method of communication between clients and web servers
34
Domain Name System (DNS)
A network protocol that translates internet domain into IP addresses
35
Network Protocols are divided into what 3 main categories ?
1. Communication protocols 2. Management protocols 3. Security protocols
36
IEEE 802.11 ( WiFi)
A set of standards that define communication for wireless LANs
37
WiFi Protected Access (WPA)
A wireless security protocol for devices to connect to the internet.
38
Firewall
Is a network security device that monitors traffic to and from your network
39
Port filtering
A firewall function that blocks or allows certain port numbers to limit unwanted communication
40
Cloud based firewalls
Software firewalls that are hosted b y a cloud based provider
41
Stateful
A class of firewall that keeps track of information passing through it and proactively filters out threats.
42
Stateless
A class of firewall that operates based open predefined rules and does not keep track of information from data packets
43
What is NGFW
Next Generation Firewalls
44
What are the benefits of NGFW/ Next generation Firewalls
1. Deep Packet inspection 2.Intrusion protection 3. Threat intelligence
45
Virtual Private Network, also known as a VPN
A network security service that changes your public IP address and hides your virtual location so that you can keep your data packet private when using a public network like the internet
46
Encapsulation
A processed performed by a VPN service that protects your data by wrapping sensitive data in other data packets.
47
Security zone
A segment of a network that protects the internal network from the internet
48
Network segmentation
a security technique that divides the network into different segments
49
What are the two types of security zones?
1. Uncontrolled zones 2. Controlled zones
50
Uncontrolled zone
Any network outside of the organizationals control
51
Controlled zone
A subnet that protects the internal network from the uncontrolled zone
52
Areas in the controlled zone
1. Demilitarized zone 2. Internal networks 3. Restricted zone
53
Subnetting
is the process of dividing a larger network into smaller, more manageable subnetworks
54
CIDR IP addresses are formatted like IPv4 addresses, but they include a ____ followed by a number at the end of the address
slash (“/’”) 198.51.100.0/24
55
Proxy server
A server that refills the request of a client by forwarding them to other servers
56
Forward proxy server
Regulates and restricts a person's access to the internet
57
Reverse proxy server
Regulates and restricts the internet access to an internal server
58
Secure shell (SSH)
A security protocol used to create a shell with a remote system
59
What are some common network intrusion attack?
1. Malware 2.Spoofing 3. Packet sniffing 4.Packet flooding
60
Attacks can harm an organization by
1. Leaking valuable or confidential information 2. Damaging an organization reputation 3. Impacting customer retention 4. Costing money and time
61
Denial of service (DoS)
a attack that targets a network or server and flood it with network traffic
62
Distributed denial of service attack (DDos)
a type of denial of service attack that uses multiple devices or servers in different locations to flood the target network with unwanted traffic.
63
SYN (synchronize) Flood attack
a type of Dos attack that simulates a TCP connection and floods a server with SYN packets
64
Internet Control Message Protocol ICMP
An internet protocol used by devices to tell each other about data transmission errors across the network
65
Internet Control Message Protocol Flood
A type of Dos attack performed by an attacker repeadetly sending ICMP packets to a network server
66
Ping of death
a type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB
67
What is a Network Protocol Analyzer
Also know as a packet analyzer, is a tool designed to capture and analyze data traffic within a network. They are commonly used as investigative tools to monitor networks and identify suspicious activity.
68
Tcpdump
a command-line network protocol analyzer. tcpdump provides a brief packet analysis and converts key information about network traffic into formats easily read by humans
69
botnet
a collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder." Each computer in the botnet can be remotely controlled to send a data packet to a target system. In a botnet attack, cyber criminals instruct all the bots on the botnet to send data packets to the target system at the same time, resulting in a DDoS attack.
70
Passive packet sniffing
a type of attack where data are read in transit
71
Active packet sniffing
a type of attack where data is manipulated in transit
72
IP Spoofing
A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network
73
Common IP spoofing attacks
1. On path attacks 2. Replay attacks 3. Smurf attacks
74
On path attack
An attack where malicious actor places themselves in the middle of an authorized connection and intercepts and alters the data in transit.
75
Replay attacks
A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time.
76
Smurf attacks
a network attack performed when an attacker sniffs and authorized user IP address and floods it with packets.
77
Where can security hardening occur?
1. devices 2. networks 3. applications 4. cloud infrastructures
78
Security hardening
the process of strengthening a system to reduce its vulnerability and attack surface
79
attack surface
all the potential vulnerabilities that an threat actor could exploit
80
security hardening is conducted on?`
1. Hardware 2. Operating systems 3. Applications 4. computer network 5. Database
81
Penetration testing AKA Pen Testing
A simulated attack that helps identify vulnerabilities in a system, network, websites, applications and processes.
82
Operating System AKA OS
The interface between computer hardware and the user.
83
Patch Update
A software and operating system update that addresses security vulnerabilities within a program or product
84
Baseline configuration (baseline image)
a documented set of specifications within a system that is used as a basis for future builds, release and updates.
85
Multi-Factor authentication AKA MFA
a security measure which requires a user to verify identity in two or more ways to access a system or network.
86
brute force attack
a trial-and-error process of discovering private information.
87
Network security hardening focuses on what?
1. Port filtering 2.Network access privilege 3. Encryption
88
Network log analysis
the process of examining network logs to identify event of interest
89
System information and event management tools (SIEM)
An application that collects and analyzes log data to monitor critical activities in an organization
90
port filtering
a firewall function that blocks or allows certain port numbers to limit unwanted communications
91
intrusion prevention system (IPS)
is an application that monitors system activity for intrusive activity and takes action to stop the activity.
92
Cloud Network
a collection of servers or computers that stores resources and data in remote data centers that can be accessed via internet.
93
World-writable file
A file that can be altered by anyone in the world