Securing Your Network Week 1 Flashcards
(10 cards)
The approach that focuses on continuous verification of users, devices, and their behavior, rather than assuming trust based on location is called
Zero Trust
What is the primary goal of network security design?
To establish a layered defense system.
To establish a layered defense system. The primary goal of network security design is to establish a layered defense system that effectively prevents, detects, and mitigates security risks.
A forward proxy is a type of proxy server that operates on the client-side.
True
A forward proxy is a type of proxy server that operates on the client-side. It can bypass IP restrictions, maintain anonymity, and filter web traffic.
A web application firewall (WAF) is a network security system that filters and blocks unwanted HTTP or HTTPS traffic based on predefined rules to and from a web server.
True
The purpose of salting in hashing is to make it more difficult for an attacker to
Crack the password hash.
Crack the password hash. Salting is a technique that adds a random string to the password before it is hashed. This makes it much more difficult for an attacker to guess the password, even if they know the hash function.
The process of converting readable content (plaintext) into an unreadable form (ciphertext) is called
Encryption
Which key principle of defense in depth (DiD) involves duplicating critical security measures?
Redundancy
The key principle of redundancy in DiD involves duplicating critical security measures to ensure backups in case of failure.
Which of the following are common hash algorithms?
SHA256
MD5
SHA512
SHA1
In Python, you can automatically encode and decode data using the Base64 library.
True
EAP is a protocol that can be used to implement 802.1X.
True