Terminology Flashcards

(19 cards)

1
Q

Write short notes on Firewall

A

A firewall is a specialized device (usually a router or PC with special software) that selectively filters or blocks traffic between networks. It acts as a barrier between a private network and external networks like the Internet. Firewalls can be configured to accept or deny traffic based on IP addresses, port numbers, or protocols. They are essential for protecting sensitive systems from unauthorized access and are one of the first lines of defense in network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Write short notes on Proxy servers

A

A proxy server is a network host that runs software acting as an intermediary between an internal network and the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Write short notes on Crackers

A

A cracker is an individual with malicious intent that users thier understanding fo operating systems and utilities to intentionaly damage, destroy or gain unauthorized access to systemsa dn data. They do this my expoiting weeak points in a system to plant harmful code, dteal data or disaable a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Write short notes on Hackers

A

A hacker is someone who studies the internal workings of operating systems and networks to better understand them. Hackers do not always act with malicious intent and may even be hired to test a network’s security as part of a professional audit. In networking, ethical hackers help organizations discover vulnerabilities before malicious actors (crackers) can exploit them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Write short notes on IPSEC

A

IPSec (Internet Protocol Security) is a suite of protocols used to encrypt and authenticate IP packets, ensuring confidentiality, integrity, and authenticity of communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Write short notes on SSL

A

SSL (Secure Sockets Layer) is a protocol used to encrypt data during transmission across the Internet, ensuring that sensitive information remains private and secure. SSL works by establishing an encrypted link between a client and a server. Though newer versions like TLS are now more common, SSL laid the foundation for secure web communication, especially for activities like online banking or shopping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Write short notes on Security audit, providing an Example.

A

A security audit is a thorough examination of every aspect of a network to identify how it might be compromised. It includes assessing user permissions, hardware settings, physical security, and software configurations. Organizations should conduct security audits regularly and after any major network changes.

For example: Reviewing firewall configurations to ensure they block unauthorized traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Write short notes on Remote control

A

Remote control refers to accessing and using a host computer over a network from a distant location. Tools like pcAnywhere or ControlIT make this possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Write short notes on Remote access control

A

Remote access control involves securing access to a private network by remote users. It includes authentication systems like login IDs and passwords, and may use RADIUS for centralized management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Write short notes on VPN

A

A VPN (Virtual Private Network) is a secure communication channel over a public network like the Internet. It uses encryption and tunneling protocols to connect remote users or branch offices to a central private network securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Write short notes on RADIUS

A

RADIUS (Remote Authentication Dial-In User Service) is a protocol that provides centralized authentication for users who connect remotely. It validates user IDs and passwords and logs session data such as time and source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Write short notes on Root

A

Root refers to the most privileged user account on a system, especially in UNIX-based networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Write short notes on Authentication

A

Authentication is the process of verifying a user’s identity before granting access to network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Write short notes on IP spoofing

A

IP spoofing is a technique where an attacker sends IP packets with a forged source address to disguise their identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Write short notes on Sniffing (in networking)

A

Sniffing is the act of capturing and analyzing network traffic using tools called sniffers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Write short notes on Snooping

A

Snooping is unauthorized viewing or monitoring of network communications.

17
Q

Write short notes on NOS

A

A Network Operating System (NOS) is software that manages network resources such as file sharing, printer access, and user accounts. Examples include Windows Server and UNIX/Linux.

18
Q

Write short notes on Eavesdropping

A

Eavesdropping is secretly listening to network communications, often by tapping into data transmissions.

19
Q

What is flashing?

A

Flashing is an attack where a user’s screen is flooded with junk or garbage characters during a chat session, forcing them to end the session.