Chapter 3 Sec+ Flashcards

1
Q

OSI

A

Open System Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

UDP

A

User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dos

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FTP

A

File Transfer Protocol

Legacy used port 20, 21 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TFTP

A

Trivial File Transfer Protocol
Uses port 69 UDP
Usually disabled by admins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL

A

Secure Socket Layer
Legacy used port 443 TCP and replaced by TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TLS

A

Transport Layer Security
Uses port 443 TCP
Used to encrypt traffic over http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IPsec

A

IP Security
Is used to encrypt IP Traffic
Uses port 500 and 4500 UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSH

A

Secure Shell
Encrypts traffic I’m transit and uses port 22 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SCP

A

Secure Copy

Is based on ssh and is used to copy encrypted files over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SFTP

A

Secure File Transfer Protocol
Extension of SSH and encrypts files
Uses port 22 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FTPS

A

File Transfer Protocol Secure
Secure implementation of FTP
Uses TLS to encrypt traffic
Uses port 989 and 990 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMTP

A

Simple Mail Transfer Protocol
Uses port 25 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SMTPS

A

Simple Mail Transfer Protocol Secure
Uses port 587 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

POP3

A

Post Office Protocol Version 3
For unencrypted port 110 TCP
For Encrypted Port 995 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HTTP

A

Hyper Text Transfer Protocol
Legacy
Uses port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HTTPS

A

Hyper Text Transfer Protocol Secure
Uses port 443 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DNS

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SPF

A

Sender Policy Framework

Uses DNS Records to define which IP address are authorized to send emails on behalf of the domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DKIM

A

Domain Keys Identified Mail

Uses public key cryptography to sign and verify an emails domain content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
DMARC
Domain-Based Message Authentication Reporting and Conformance Builds on top of SPF,and DKIM Sets policy's on how to handle emails that fail authentication check
26
AD DS
Active Directory Domain Services
27
LDAP
Lightweight Directory Access Protocol Uses port 389 TCP
28
LDAPS
Lightweight Directory Access Protocol Secure Uses port 636 TCP
29
RTP
Real-Time Transport Protocol Delivers audio and Video over IP Networks
30
VOIP
Voice Over Internet Protocol Does communications, streaming etc
31
SRTP
Secure Real Time Transport Protocol Provides encryption,message authentication and integrity to RTP
32
SIP
Session Initiation Protocol Used to initiate, maintain, and terminate voice,video and message session
33
GPO
Group Policy Object
34
RDP
Remote Desktop Protocol Admins and clients use RDP to connect to other systems from Remote Locations
35
OpenSSH
Suite of tools that simplifies the use of ssh
36
NTP
Network Time Protocol
37
DHCP
Dynamic Host Configuration Protocol
38
IPv4
Internet Protocol Version 4 Uses 32 bit IP address 100.100.100.100
39
ISP
Internet Service Protocol
40
IPv6
Internet Protocol Version 6
41
IANA
Internet Assigned Number Authority
42
IETF
Internet Engineering Task Force
43
MX
Mail Exchange
44
CNAME
Canonical Name
45
TTL
Time to Live
46
SOA
Start Of Authority
47
DNSSEC
Domain Name Security Extension
48
RRSIG
Resource Record Signature
49
STP
Spanning Tree Prevention Provide both Broadcast Storm Prevention and loop prevention
50
RSTP
Rapid Spanning Tree Protocol
51
BPDU
Bridge Protocol Data Unit STP sends BPDU messages in a network to detect loops
52
NIC
Network Interface Card
53
ACLs
Access Control Lists
54
SNMP
Simple Network Management Protocol Monitors and manages network devices, such as routers or switches SNMPv3 Encrypts credentials before sending them over the network Uses port 161 and 162 UDP
55
WAF
Web Application Firewall
56
NGFW
Next Generation Firewall Performs deep-packet inspections Can identify application commands and detect malicious traffic Allows content filtering and URL filtering and can use Stateless and Stateful firewalls
57
DMZ
Demilitarized Zone or Screened Subnet Placed in-between the Internet and intranet
58
NAT
Network Address Translation Translates public IPS to private Ips and vis versa
59
PAT
Port Address Translation
60
SCADA
Supervisory Control and Data Aquistion Isolated in an intranet and they gather data and analyze it
61
VLAN
Virtual Local Area Network Used to Subnet a network Can organize computers that are in different locations into one Traffic that goes through the VLAN can only be seen by users in the VLAN. Helps to alleviate broadcast traffic Are configured on switches
62
UTM
Unified Threat Management Is an application that goal is to provide better security Provides URL filtering, Malware Inspection, Content Inspection, DDos Mitigator Is usually placed at network border
63
ZTNA
Zero Trust Network Access Refers to the idea that we don't make trust decisions based on network locations
64
PEP
Policy Enforcement Point The network enforces decisions Sits between Control and Data Plane
65
PE
Policy Engine Is located on Control plane And decides wether to grant access to a resource for a given subject
66
PA
Policy administrator Is located in the Control plane Is responsible for communicating the decisions made by the PE
67
SASE
Secure Access Service Edge Is designed closely related to ZTNA That brings together Networking and Security functions and delivers them as and integrated cloud service
68
CASB
Cloud Access Service Broker