Chapter 3 Sec+ Flashcards

1
Q

OSI

A

Open System Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

UDP

A

User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dos

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FTP

A

File Transfer Protocol

Legacy used port 20, 21 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TFTP

A

Trivial File Transfer Protocol
Uses port 69 UDP
Usually disabled by admins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL

A

Secure Socket Layer
Legacy used port 443 TCP and replaced by TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TLS

A

Transport Layer Security
Uses port 443 TCP
Used to encrypt traffic over http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IPsec

A

IP Security
Is used to encrypt IP Traffic
Uses port 500 and 4500 UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSH

A

Secure Shell
Encrypts traffic I’m transit and uses port 22 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SCP

A

Secure Copy

Is based on ssh and is used to copy encrypted files over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SFTP

A

Secure File Transfer Protocol
Extension of SSH and encrypts files
Uses port 22 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FTPS

A

File Transfer Protocol Secure
Secure implementation of FTP
Uses TLS to encrypt traffic
Uses port 989 and 990 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMTP

A

Simple Mail Transfer Protocol
Uses port 25 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SMTPS

A

Simple Mail Transfer Protocol Secure
Uses port 587 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

POP3

A

Post Office Protocol Version 3
For unencrypted port 110 TCP
For Encrypted Port 995 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HTTP

A

Hyper Text Transfer Protocol
Legacy
Uses port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HTTPS

A

Hyper Text Transfer Protocol Secure
Uses port 443 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DNS

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SPF

A

Sender Policy Framework

Uses DNS Records to define which IP address are authorized to send emails on behalf of the domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DKIM

A

Domain Keys Identified Mail

Uses public key cryptography to sign and verify an emails domain content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

DMARC

A

Domain-Based Message Authentication Reporting and Conformance

Builds on top of SPF,and DKIM
Sets policy’s on how to handle emails that fail authentication check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

AD DS

A

Active Directory Domain Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

LDAP

A

Lightweight Directory Access Protocol
Uses port 389 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

LDAPS

A

Lightweight Directory Access Protocol Secure
Uses port 636 TCP

29
Q

RTP

A

Real-Time Transport Protocol
Delivers audio and Video over IP Networks

30
Q

VOIP

A

Voice Over Internet Protocol
Does communications, streaming etc

31
Q

SRTP

A

Secure Real Time Transport Protocol
Provides encryption,message authentication and integrity to RTP

32
Q

SIP

A

Session Initiation Protocol

Used to initiate, maintain, and terminate voice,video and message session

33
Q

GPO

A

Group Policy Object

34
Q

RDP

A

Remote Desktop Protocol

Admins and clients use RDP to connect to other systems from Remote Locations

35
Q

OpenSSH

A

Suite of tools that simplifies the use of ssh

36
Q

NTP

A

Network Time Protocol

37
Q

DHCP

A

Dynamic Host Configuration Protocol

38
Q

IPv4

A

Internet Protocol Version 4
Uses 32 bit IP address
100.100.100.100

39
Q

ISP

A

Internet Service Protocol

40
Q

IPv6

A

Internet Protocol Version 6

41
Q

IANA

A

Internet Assigned Number Authority

42
Q

IETF

A

Internet Engineering Task Force

43
Q

MX

A

Mail Exchange

44
Q

CNAME

A

Canonical Name

45
Q

TTL

A

Time to Live

46
Q

SOA

A

Start Of Authority

47
Q

DNSSEC

A

Domain Name Security Extension

48
Q

RRSIG

A

Resource Record Signature

49
Q

STP

A

Spanning Tree Prevention
Provide both Broadcast Storm Prevention and loop prevention

50
Q

RSTP

A

Rapid Spanning Tree Protocol

51
Q

BPDU

A

Bridge Protocol Data Unit
STP sends BPDU messages in a network to detect loops

52
Q

NIC

A

Network Interface Card

53
Q

ACLs

A

Access Control Lists

54
Q

SNMP

A

Simple Network Management Protocol

Monitors and manages network devices, such as routers or switches
SNMPv3 Encrypts credentials before sending them over the network
Uses port 161 and 162 UDP

55
Q

WAF

A

Web Application Firewall

56
Q

NGFW

A

Next Generation Firewall
Performs deep-packet inspections
Can identify application commands and detect malicious traffic
Allows content filtering and URL filtering and can use Stateless and Stateful firewalls

57
Q

DMZ

A

Demilitarized Zone or Screened Subnet
Placed in-between the Internet and intranet

58
Q

NAT

A

Network Address Translation
Translates public IPS to private Ips and vis versa

59
Q

PAT

A

Port Address Translation

60
Q

SCADA

A

Supervisory Control and Data Aquistion
Isolated in an intranet and they gather data and analyze it

61
Q

VLAN

A

Virtual Local Area Network
Used to Subnet a network
Can organize computers that are in different locations into one
Traffic that goes through the VLAN can only be seen by users in the VLAN.
Helps to alleviate broadcast traffic
Are configured on switches

62
Q

UTM

A

Unified Threat Management
Is an application that goal is to provide better security
Provides URL filtering, Malware Inspection, Content Inspection, DDos Mitigator
Is usually placed at network border

63
Q

ZTNA

A

Zero Trust Network Access
Refers to the idea that we don’t make trust decisions based on network locations

64
Q

PEP

A

Policy Enforcement Point
The network enforces decisions
Sits between Control and Data Plane

65
Q

PE

A

Policy Engine
Is located on Control plane
And decides wether to grant access to a resource for a given subject

66
Q

PA

A

Policy administrator
Is located in the Control plane
Is responsible for communicating the decisions made by the PE

67
Q

SASE

A

Secure Access Service Edge
Is designed closely related to ZTNA
That brings together Networking and Security functions and delivers them as and integrated cloud service

68
Q

CASB

A

Cloud Access Service Broker