4. Network Security Flashcards

1
Q

This ensures that information can only be accessed by those who are authorized.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This ensures that data is accurate and has not been tampered with.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This ensures that systems and data are accessible when needed.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This refers to protecting data while it’s being transmitted over a network.

A

Data in Transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This refers to protecting stored data on hard drives, backups, or cloud storage.

A

Data at Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is used to encrypt and verify data, often issued by a trusted authority.

A

Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system for managing encryption keys and digital certificates.

A

PKI (Public Key Infrastructure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A certificate that is not signed by a certificate authority (CA), often used internally.

A

Self-Signed Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is the process of verifying a user’s identity.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This uses two or more types of credentials (e.g., password + phone) to verify identity.

A

Multifactor Authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This allows users to log in once and access multiple systems without re-entering credentials.

A

Single Sign-On (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A centralized AAA protocol commonly used for remote network access.

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An open protocol used to access and manage directory information (usernames, groups, etc.).

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This XML-based protocol is used for exchanging authentication and authorization data between parties.

A

SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Cisco-developed AAA protocol that provides detailed command control.

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Uses time-based algorithms (like TOTP) for generating temporary access codes.

A

Time-Based Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Determines what a user is allowed to do after authentication.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The principle of giving users only the access they need to do their job.

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Access control based on job responsibilities or organizational roles.

A

Role-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A security method that restricts access based on physical location.

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Physical devices that monitor activity visually.

A

Security Cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A physical access control method that requires a key or code.

A

Locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A decoy system set up to attract attackers and detect intrusions.

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A controlled network of honeypots used to observe attacker behavior.

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A potential danger to systems or data.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A flaw or weakness that could be exploited by a threat.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A specific method used to take advantage of a vulnerability.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The likelihood and impact of a security incident.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Regulation that governs cardholder data security.

A

PCI DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

EU regulation focused on personal data protection and privacy.

A

GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Laws or policies that restrict where data must physically reside.

A

Data Locality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Segmenting a network to control access and reduce exposure.

A

Network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Devices that often lack traditional security protections and should be isolated.

A

IoT / IIoT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Used in industrial settings to control and monitor infrastructure systems.

A

SCADA / ICS / OT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A network zone designated for temporary or untrusted users.

A

Guest Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A policy that allows employees to use personal devices on corporate networks.

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which part of the CIA triad ensures that only authorized users can access sensitive information?
A. Availability
B. Confidentiality
C. Integrity
D. Access Control

A

B. Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the main goal of a honeypot in a network environment?
A. Encrypt traffic
B. Redirect real traffic
C. Detect and observe attacker behavior
D. Block malware downloads

A

C. Detect and observe attacker behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following best describes a self-signed certificate?
A. It is issued by a public certificate authority
B. It is encrypted with a third-party key
C. It is signed by the same entity that created it
D. It requires MFA to be validated

A

C. It is signed by the same entity that created it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which access control method limits access based on a user’s job title or department?
A. Least privilege
B. Multifactor authentication
C. Role-based access control
D. Authorization

A

C. Role-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the difference between a threat and a vulnerability?
A. Threats are known; vulnerabilities are theoretical
B. A threat is a risk rating; a vulnerability is a technique
C. A threat is potential harm; a vulnerability is a weakness
D. A vulnerability is external; a threat is internal

A

C. A threat is potential harm; a vulnerability is a weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What protocol is commonly used for centralized authentication and accounting on wireless or VPN access?
A. LDAP
B. TACACS+
C. RADIUS
D. SAML

A

C. RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following ensures that data has not been altered in transit?
A. Encryption
B. Availability
C. Integrity
D. Authentication

A

C. Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What type of authentication uses an app like Google Authenticator to generate a one-time code?
A. Biometric
B. Role-based
C. Time-based
D. SAML

A

C. Time-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which regulation applies to the handling of payment card data?
A. HIPAA
B. PCI DSS
C. GDPR
D. NIST 800-53

A

B. PCI DSS

46
Q

What’s the primary risk of allowing BYOD on a corporate network?
A. Power consumption
B. Encryption speed
C. Loss of control over unmanaged devices
D. Excessive camera use

A

C. Loss of control over unmanaged devices

47
Q

This attack overwhelms a service or system to make it unavailable to legitimate users.

A

Denial-of-Service (DoS)

48
Q

A coordinated DoS attack using multiple systems to flood a target simultaneously.

A

Distributed Denial-of-Service (DDoS)

49
Q

This switch attack tricks the network into allowing traffic from one VLAN to another.

A

VLAN Hopping

50
Q

An attack that floods a switch’s MAC address table, forcing it to act like a hub.

A

MAC Flooding

51
Q

Sends false ARP replies to poison the ARP cache and redirect traffic.

A

ARP Poisoning

52
Q

Forging ARP replies to impersonate another device on the network.

A

ARP Spoofing

53
Q

Injects false DNS data into a DNS resolver’s cache to redirect users to malicious sites.

A

DNS Poisoning

54
Q

A type of DNS attack where fake responses are sent to redirect users to a malicious site.

A

DNS Spoofing

55
Q

Unauthorized network devices placed to intercept, disrupt, or impersonate services.

A

Rogue Device

56
Q

A fake DHCP server that assigns incorrect IP settings, often used in MITM attacks.

A

Rogue DHCP Server

57
Q

A malicious access point that mimics a legitimate AP to trick users into connecting.

58
Q

An attacker secretly intercepts or alters communication between two parties.

A

On-Path Attack

59
Q

Any attack that manipulates or tricks humans into compromising security.

A

Social Engineering

60
Q

An attempt to trick users into revealing sensitive information through fake emails or websites.

61
Q

Physically retrieving discarded sensitive information from trash bins.

A

Dumpster Diving

62
Q

Spying over someone’s shoulder to see passwords or other sensitive information.

A

Shoulder Surfing

63
Q

Following someone into a restricted area without proper access.

A

Tailgating

64
Q

Any software intended to harm, exploit, or disrupt systems.

65
Q

Which type of attack floods a system with traffic from multiple sources to make it unavailable?
A. On-path attack
B. DoS
C. ARP spoofing
D. DDoS

66
Q

What kind of attack involves sending fake ARP responses to redirect network traffic?
A. DNS poisoning
B. VLAN hopping
C. ARP spoofing
D. Evil twin

A

C. ARP spoofing

67
Q

Which attack causes a switch to flood all ports by overwhelming its MAC table?
A. MAC flooding
B. ARP poisoning
C. DNS spoofing
D. Tailgating

A

A. MAC flooding

68
Q

What is a rogue DHCP server typically used for?
A. Encrypt network traffic
B. Bypass DNS
C. Assign incorrect IP settings
D. Block MAC addresses

A

C. Assign incorrect IP settings

69
Q

Which of the following tricks users into revealing sensitive info through fake websites or emails?
A. Shoulder surfing
B. Phishing
C. Dumpster diving
D. Evil twin

A

B. Phishing

70
Q

Which physical attack involves entering a restricted area by following someone else in?
A. Tailgating
B. Shoulder surfing
C. VLAN hopping
D. On-path attack

A

A. Tailgating

71
Q

Which type of malware disguises itself as legitimate software but performs malicious actions?
A. Worm
B. Virus
C. Trojan
D. Rootkit

72
Q

What is the goal of DNS spoofing?
A. Destroy DNS servers
B. Assign fake IP addresses
C. Redirect users to malicious sites
D. Prevent ARP traffic

A

C. Redirect users to malicious sites

73
Q

Which attack sets up a fake wireless network to mimic a real access point?
A. On-path attack
B. Rogue DHCP
C. Evil twin
D. ARP spoofing

A

C. Evil twin

74
Q

Which social engineering method involves watching someone type a password in public?
A. Tailgating
B. Phishing
C. Dumpster diving
D. Shoulder surfing

A

D. Shoulder surfing

75
Q

This practice reduces attack surface by disabling unnecessary services or ports.

A

Device Hardening

76
Q

A basic step in hardening that eliminates common vulnerabilities in default settings.

A

Change Default Passwords

77
Q

Controls access to the network based on authentication and device posture.

A

Network Access Control (NAC)

78
Q

Restricts access to switch ports by limiting allowed MAC addresses.

A

Port Security

79
Q

An IEEE standard for port-based network access control using authentication protocols.

80
Q

Allows or blocks devices from connecting based on their physical MAC addresses.

A

MAC Filtering

81
Q

The process of securely generating, storing, distributing, and revoking cryptographic keys.

A

Key Management

82
Q

Defines what traffic is allowed or denied at a router or firewall level.

A

Access Control List (ACL)

83
Q

Blocks access to specific websites by matching the URL against a rule list.

A

URL Filtering

84
Q

Blocks access to certain types of data or content based on category or pattern.

A

Content Filtering

85
Q

Network area where traffic is considered safe, such as an internal LAN.

A

Trusted Zone

86
Q

Network area considered outside the organization, such as the internet.

A

Untrusted Zone

87
Q

A network segment (often a DMZ) that separates trusted and untrusted zones to provide layered defense.

A

Screened Subnet

88
Q

A foundational step in securing a device, this involves disabling unused ports, services, and interfaces to reduce the attack surface.

A

Device Hardening

89
Q

Attackers often target default credentials—changing these immediately is a critical first line of defense.

A

Change Default Passwords

90
Q

Used to control which users or devices can access the network, this security system often checks endpoint compliance.

A

Network Access Control (NAC)

91
Q

Prevents unauthorized devices from accessing a network switch by limiting each port to specific MAC addresses.

A

Port Security

92
Q

A secure authentication framework used to validate users or devices before granting network access—commonly used in enterprise networks with RADIUS.

93
Q

Allows or denies network access based on the device’s unique hardware address—useful for basic filtering but not spoof-proof.

A

MAC Filtering

94
Q

Centrally manages encryption keys for secure communications—ensures key generation, renewal, revocation, and storage are all properly handled.

A

Key Management

95
Q

Used in firewalls and routers, this defines rules to allow or block traffic based on IP address, protocol, port, or other criteria.

A

Access Control List (ACL)

96
Q

Blocks user access to specific websites based on full or partial matches of the URL—can be applied at the firewall, proxy, or DNS level.

A

URL Filtering

97
Q

Analyzes content (e.g., files, emails, downloads) to block inappropriate, dangerous, or restricted material—may use keywords or pattern matching.

A

Content Filtering

98
Q

Network segment where devices are assumed to be trustworthy—typically includes internal users and systems.

A

Trusted Zone

99
Q

Any external or unknown part of the network—like the internet—where threats are presumed.

A

Untrusted Zone

100
Q

Also called a DMZ, this isolated segment sits between the trusted and untrusted networks, hosting systems like web servers or proxies to reduce risk.

A

Screened Subnet

101
Q

Which of the following is a key part of device hardening?
A. Enabling all ports
B. Setting public passwords
C. Disabling unused services
D. Opening firewall rules

A

C. Disabling unused services

102
Q

What is the purpose of 802.1X?
A. Encrypt wireless traffic
B. Block malware downloads
C. Authenticate devices before granting network access
D. Assign MAC addresses to hosts

A

C. Authenticate devices before granting network access

103
Q

Which access control method uses hardware addresses to determine who can connect?
A. URL filtering
B. Port security
C. MAC filtering
D. Key management

A

C. MAC filtering

104
Q

What security technique limits which websites users can visit based on full or partial matches?
A. ACL
B. URL filtering
C. Content filtering
D. 802.1X

A

B. URL filtering

105
Q

A screened subnet is most commonly used to:
A. Extend wireless access outdoors
B. Encrypt user traffic
C. Host public-facing services while protecting internal systems
D. Authenticate internal users

A

C. Host public-facing services while protecting internal systems

106
Q

Which of the following allows or denies network traffic based on rules about IPs, ports, or protocols?
A. Key management
B. Access control list (ACL)
C. Content filtering
D. DHCP snooping

A

B. Access control list (ACL)

107
Q

A network zone that includes your internal LAN and trusted devices is called a:
A. DMZ
B. Untrusted zone
C. Trusted zone
D. Rogue network

A

C. Trusted zone

108
Q

Which technique ensures encryption keys are securely created, stored, and distributed?
A. Device hardening
B. PKI
C. Key management
D. SSL

A

C. Key management

109
Q

Which network control checks endpoint health and grants or denies access accordingly?
A. 802.1X
B. NAC
C. SSO
D. VLAN hopping

110
Q

Changing default credentials on routers and switches helps prevent:
A. Content filtering
B. Unauthorized access via known credentials
C. DNS poisoning
D. Key expiration

A

B. Unauthorized access via known credentials