Ch. 4 - Network Security Flashcards

1
Q

What port number does File Transfer Protocol (FTP) use?

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What port number does Telnet use?

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What port number for Secure Shell (SSH)?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port does Simple Mail Transfer Protocol (SMTP) use?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port does Time Protocol use?

A

123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What port number does Domain Name Service use?

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What port number does HTTP and HTTPS use?

A

80 and 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What port number does LDAP and LDAPS use?

A

389 and 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Port 21?

A

FTP - File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port 22?

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port 23?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port 25?

A

SMTP - Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port 53?

A

DNS - Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port 80?

A

HTTP - Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Port 123?

A

NTP - Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port 389?

A

LDAP - Lightweight Directory Access Protocol

17
Q

Port 443?

A

HTTPS - Hypertext Transfer Protocol Secure

18
Q

Port 636?

A

LDAPS - Lightweight Directory Access Protocol Secure

19
Q

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services)
that can be rapidly provisioned and released with minimal management effort or service provider interaction.

A. Virtualization
B. On-Premises Computing
C. Cloud Computing
D. Virtual Desktop Interface (VDI)

A

C. Cloud Computing

Source: NIST 800-145

20
Q

A system in which the cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy and compliance considerations). It may be owned, managed and operated by one or more of the organizations in the community, a third party or some combination of them, and it may exist on or off premises.

A. Community Cloud
B. Public Cloud
C. Hybrid Cloud
D. Private Cloud

A

A. Community Cloud

Source: NIST 800-145

21
Q

The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.) Typically, a one-to-one attack.

A. Denial-of-Service (DoS)
B. Phishing
C. Snarfing
D. Man-in-the-Middle

A

A. Denial-of-Service (DoS)

NIST SP 800-27 Rev A

22
Q

The process and act of converting the message from its plaintext to ciphertext.

A. Decryption
B. Decapsulation
C. Encapsulation
D. Encryption

A

D. Encryption

23
Q

The internet protocol (and program) used to transfer files between hosts.

A

File Transfer Protocol (FTP)
Port 21

24
Q

A combination of public cloud storage and private cloud storage where some critical data resides in the enterprise’s private cloud while other data is stored and accessible from a public cloud storage provider.

A. Community Cloud
B. Public Cloud
C. Hybrid Cloud
D. Private Cloud

A

C. Hybrid Cloud

25
Q

The provider of the core computing, storage and network hardware and software that is the foundation upon which organizations can build and then deploy applications. It’s popular in the data center where software and servers are purchased as a fully outsourced service and usually billed on usage and how much of the resource is used.

A. Platform as a Service (PaaS)
B. Infrastructure as a Service (IaaS)
C. Database as a Service (DaaS)
D. Software as a Service (SaaS)

A

B. Infrastructure as a Service (IaaS)

26
Q

An attack where the adversary positions himself in between the user and the system so that he can intercept and alter data traveling between them.

A. Mantrap
B. Piggybacking
C. Man-in-the-Middle
D. Mancave

A

C. Man-in-the-Middle

27
Q

Security standards that apply to merchants and service providers who process credit or debit card transactions.

A. PII
B. PCI DSS
C. HIPAA
D. DIA

A

B. Payment Card Industry Data Security Standard (PCI DSS)

28
Q

The web-authoring or application development middleware environment that allows applications to be built in the cloud.

A. Platform as a Service (PaaS)
B. Infrastructure as a Service (IaaS)
C. Database as a Service (DaaS)
D. Software as a Service (SaaS)

A

A. Platform as a Service (PaaS)

29
Q

The phrase used to describe a cloud computing platform that is implemented within the corporate firewall, under the control of the IT department. It’s designed to offer the same features and benefits of cloud systems, but removes a number of objections to the cloud computing model, including control over enterprise and customer data, worries about security, and issues connected to regulatory compliance.

A. Community Cloud
B. Public Cloud
C. Hybrid Cloud
D. Private Cloud

A

D. Private Cloud

30
Q

The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider.

A. Community Cloud
B. Public Cloud
C. Hybrid Cloud
D. Private Cloud

A

B. Public Cloud

Source: NIST SP 800-145

31
Q

The standard communication protocol for sending and receiving emails between senders and receivers.

A

Simple Mail Transport Protocol (SMTP)
Port 25

32
Q

The cloud customer uses the cloud provider’s applications running within a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application capabilities with the possible exception of limited user-specific application capabilities configuration settings.

A. Platform as a Service
B. Infrastructure as a Service
C. Database as a Service
D. Software as a Service

A

D. Software as a Service

Source: NIST SP 800-145

33
Q

Removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset.

A. Zero Trust
B. Zero Day
C. Zero Access
D. Zero Tolerance

A

A. Zero Trust