Securing Your Network Week 1 Flashcards

(10 cards)

1
Q

The approach that focuses on continuous verification of users, devices, and their behavior, rather than assuming trust based on location is called

A

Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary goal of network security design?

A

To establish a layered defense system.

To establish a layered defense system. The primary goal of network security design is to establish a layered defense system that effectively prevents, detects, and mitigates security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A forward proxy is a type of proxy server that operates on the client-side.

A

True

A forward proxy is a type of proxy server that operates on the client-side. It can bypass IP restrictions, maintain anonymity, and filter web traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A web application firewall (WAF) is a network security system that filters and blocks unwanted HTTP or HTTPS traffic based on predefined rules to and from a web server.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The purpose of salting in hashing is to make it more difficult for an attacker to

A

Crack the password hash.

Crack the password hash. Salting is a technique that adds a random string to the password before it is hashed. This makes it much more difficult for an attacker to guess the password, even if they know the hash function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of converting readable content (plaintext) into an unreadable form (ciphertext) is called

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which key principle of defense in depth (DiD) involves duplicating critical security measures?

A

Redundancy

The key principle of redundancy in DiD involves duplicating critical security measures to ensure backups in case of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are common hash algorithms?

A

SHA256
MD5
SHA512
SHA1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Python, you can automatically encode and decode data using the Base64 library.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EAP is a protocol that can be used to implement 802.1X.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly