Basic Technical Questions Flashcards

1
Q

IDS vs IPS

A

Intrusion Detection System vs Intrusion Prevention System

Both are network security systems - one can prevent and detect the other can only detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Encryption

A

Uses a single key to both encrypt and decrypt data. This method is faster and easier to use than asymmetric encryption, but it’s also less secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Zero Trust Architecture

A

Implies assuming no implicit trust from within a network and verifies every request as if it originates from an open network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common Network Attacks

A

DDOS, MITM, Phishing, SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric Encryption

A

Uses two different keys, one public and one private, to encrypt and decrypt data. This method is more secure than symmetric encryption because even if one key is compromised, the data remains safe. Slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hashing

A

is a one-way function that converts data into a fixed-length hash value. Used to verify integrity. SHA256 for example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encyption

A

Encryption is a 2 way Secure encoding of data used to protect the confidentiality of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a VPN?

A

Virtual Private Network
creates a secure, encrypted connection over a less secure network, typically the internet. It secures communication by encrypting data transmitted between the VPN client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP

A

Transmission Control Protocol
connection-oriented, providing reliable data transfer with error checking and flow control.
Used for things that require accuracy not speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UDP

A

User Diagram Protocol
Connectionless, offering faster, but less reliable, communication. Used for VOIP, streaming and gaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer 1

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layer 2

A

Data Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 3

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layer 4

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Layer 5

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Layer 6

A

Presentation Layer

17
Q

Layer 7

A

Application Layer

18
Q

Three Way Handshake

A

Syn
Syn Ack
Ack

19
Q

What is ARP?

A

Address Resolution Protocol
Used for discovering the Data Link Layer address, such as a MAC address

20
Q

What is DHCP

A

Is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses

21
Q

CIA

A

Confidentiality
Integrity
Availability

22
Q

What is AAA?

A

Authorisation
Accounting
Authentication

23
Q
A