12 Network security Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the foundation of network security?

A

A secure design

Networks must be designed with security in mind, considering the attack surface and segmentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does NAC stand for in network security?

A

Network Access Control

NAC and 802.1X protect networks from untrusted devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some methods to prevent network issues from malicious or misconfigured systems?

A
  • Port security
  • Loop prevention
  • Broadcast storm protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of network taps?

A

Allow packet capture by creating a copy of traffic from other ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a VPN used for?

A

To tunnel network traffic to another location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank: Secure network design includes concepts like _______.

A

[key learning term]

Examples include physical isolation, logical segmentation, and secure protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the function of jump servers?

A

Provide a secure way to access systems in another security zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are load balancers used for?

A

Spread load among systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Proxy servers centralize connections from a group of clients to a server.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do web filters do?

A

Filter content and URLs based on rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of data loss prevention systems?

A

Monitor to ensure that sensitive data is identified and flagged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do IDS and IPS devices do?

A

Identify and take action based on malicious behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What types of firewalls are mentioned?

A
  • Next-generation firewalls
  • Web application firewalls
  • Unified threat management appliances
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of access control lists?

A

Determine what traffic can flow through devices based on rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is out-of-band management?

A

Management interfaces on a separate VLAN or physical network.

17
Q

What does DNSSEC do?

A

Helps validate DNS servers and responses.

18
Q

What protocols are leveraged for email security?

A
  • DMARC
  • DKIM
  • SPF
19
Q

What is the function of TLS in network security?

A

Protect network traffic.

20
Q

What do file integrity monitors check?

A

If files have been changed.

21
Q

What are honeypots and honeynets used for?

A

Gather information about attackers.

22
Q

What is the significance of secure protocols?

A

Provide ways to send and receive information securely.

23
Q

What are some key secure protocols mentioned?

A
  • SRTP
  • IMAPS
  • POPS
  • LDAPS
24
Q

Fill in the blank: On-path attacks _______ traffic through a system controlled by an attacker.

A

[key learning term]

25
Q

What are examples of DNS attacks?

A
  • Domain hijacking
  • DNS poisoning
  • URL redirection
26
Q

What do credential replay attacks exploit?

A

Poorly designed or insecure protocols.

27
Q

What do denial-of-service attacks aim to do?

A

Consume resources or target services to cause them to fail.

28
Q

True or False: Reflected denial-of-service attacks use spoofed source addresses.

29
Q

What is the difference between reflected and amplified denial-of-service attacks?

A

Reflected uses spoofed addresses; amplified uses small queries for large results.