Basics Flashcards

1
Q

3 main types of Physical Security Controls

A

Access Controls, Monitoring, and Deterrents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control Examples

A

Mantraps, Turnstiles/Gates, Electronic Doors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Monitoring Controls Examples

A

CCTV, Security Guards, Intrusion Detection Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Deterrent Examples

A

Warning Signs, Fences, Guard Dogs, Security Lighting, CCTV Cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

7 types of Endpoint Security

A

HIDS, HIPS, Anti-Virus Solutions, Log Monitoring, Endpoint Detection and Response (EDR), Vulnerability Scanning, Compliance Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4 types Email Security

A

Spam Filter, Data Loss Prevention, Email Scanning, Security Awareness Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 types of Network Security

A

Network Intrusion Detection, Network Intrusion Prevention, Firewalls, Log Monitoring, Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication

A

Something you know, Something you have, something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authorization

A

What the authenticated user is permitted to do/access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Accountability

A

the process of being able to identify what has happened and when

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Transmission Control Protocol (TCP)

A

a connection-oriented protocol that allows two systems to establish a connection that will enable the two-way transmission of data. Any data loss is detected and automatically corrected, which is why TCP is a reliable protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What layer does TCP work at?

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do systems communicate with each other using TCP?

A
  1. The requesting client sends the server an SYN (synchronize) packet with a random number, which ensures that data is sent in the right order and nothing is missed.
    1. The server receives the packet and accepts the connection by sending an SYN-ACK (synchronize acknowledgment) packet back to the client, including the client’s sequence number plus 1. It also transmits its own sequence number to the requesting client.
    2. Finally, the client acknowledges the receipt of the SYN-ACK segment by sending its own ACK packet, which in this case contains the server’s sequence number plus 1. At the same time, the client can already begin transferring data to the server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is User Datagram Protocol (UDP)?

A

a protocol that allows datagrams to be sent without connection in IP-based networks. To achieve the desired services on the target hosts, it uses ports that are listed as one of the core components in the UDP header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is UDP connectionless?

A

it takes place without an existing connection between addressee and recipient. The respective packets are then sent to the preferred IP address, specifying the target port, without the computer behind them having to respond. However, if packets are also to be returned to the recipient, the UDP header can optionally also contain the source port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which is faster? TCP or UDP

A

UDP

17
Q

Which is more secure? TCP or UDP

A

TCP

18
Q

Internet Control Message Protocol used for?

A

used by network devices to diagnose network communication issues. ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner. Commonly, the ICMP protocol is used on network devices, such as routers

19
Q

What are the 7 layers of the OSI Model

A

Application, Presentation, Session, Transport, Network, Data Link, Physical

20
Q

Switch

A

A smart Hub, knows where to send data instead of sending to everyone. Uses MAC addresses

21
Q

Hub

A

A network device that connects all devices on a Local-Area-Network or LAN. When a system sends data to the hub on one port, the hub will broadcast these to all other attached devices

22
Q

Bridge

A

A network bridge device works to connect separate networks to make them into one larger network. This is different than a router, which allows networks to be connected but work independently. In the OSI model, bridging works at Layer 2, the Data Link Layer.

23
Q

Router

A

A router is a network device that forwards data based on a logical address. In the case of TCP/IP networks, the router would forward data based on the IP addresses of systems.

24
Q

Firewall

A

A firewall is a network device that provides fundamental network security, by monitoring incoming and outgoing traffic and determining whether to allow or block it, based on rules.