Connect and Protect: Networks and Network Security Flashcards

1
Q

Bandwidth

A

The maximum data transmission capacity over a network, measured by bits per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud computing

A

The practice of using remote servers, application, and network services that are hosted on the internet instead of on local physical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloud network

A

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data packet

A

A basic unit of information that travels from one device to another within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hub

A

A network device that broadcasts information to every device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet Protocol (IP)

A

A set of standards used for routing and addressing data packets as they travel between devices on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet Protocol (IP) address

A

A unique string of characters that identifies the location of a device on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Local Area Network (LAN)

A

A network that spans small areas like an office building, a school, or a home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Media Access Control (MAC) address

A

A unique alphanumeric identifier that is assigned to each physical device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Modem

A

A device that connects your router to the internet and brings internet access to the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network

A

A group of connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Open systems interconnection (OSI) model

A

A standardized concept that describes the seven layers computers use to communicate and send data over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Packet sniffing

A

The practice of capturing and inspecting data packets across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port

A

A software-based location that organizes the sending and receiving of data between devices on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Router

A

A network device that connects multiple networks together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Speed

A

The rate at which a device sends and receives data, measured by bits per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Switch

A

A device that makes connections between specific devices on a network by sending and receiving data between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP/IP model

A

A framework used to visualize how data is organized and transmitted across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Transmission Control Protocol (TCP)

A

An internet communication protocol that allows two devices to form a connection and stream data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

User Datagram Protocol (UDP)

A

A connectionless protocol that does not establish a connection between devices before transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Wide Area Network (WAN)

A

A network that spans a large geographic area like a city, state, or country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does IP stand for?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does LAN stand for?

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does MAC stand for?

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does OSI stand for?

A

Open Systems Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does TCP stand for?

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does UDP stand for?

A

User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does WAN stand for?

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Firewall

A

A network security device that monitors traffic to or from your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What do servers provide?

A

They provide information and services for devices like computers, smart home devices, and smartphones on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Wireless access point

A

Sends and receives digital signals over radio waves creating a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Network diagrams

A

Maps that show the devices on the network and how they connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the 3 services that CSPs provide?

A

Software as a service (SaaS), Infrastructure as a service (IaaS), and Platform as a service (PaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Software as a service (SaaS)

A

Refers to software suites operated by the CSP that a company can use remotely without hosting the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Infrastructure as a service (IaaS)

A

Refers to the use of virtual computer components offered by the CSP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Platform as a service (PaaS)

A

Refers to tools that application developers can use to design custom applications for their company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the 4 layers of the TCP/IP models?

A

Network Access, Transport, Internet, and Application layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the 7 layers of the OSI model?

A

Physical, Data Link, Network, Transport, Session, Presentation, and Application layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Address Resolution Protocol (ARP)

A

A network protocol used to determine the MAC address of the next router or device on the path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Cloud-based firewalls

A

Software firewalls that are hosted by the cloud service provider.

41
Q

Controlled zone

A

A subnet that protects the internal network from the uncontrolled zone.

42
Q

Domain Name System (DNS)

A

A networking protocol that translates internet domain names into IP addresses.

43
Q

Encapsulation

A

A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets.

44
Q

Firewall

A

A network security device that monitors traffic to or from your network.

45
Q

Forward proxy server

A

A server that regulates and restricts a person’s access to the internet.

46
Q

Hypertext Transfer Protocol (HTTP)

A

An application layer protocol that provides a method of communication between clients and website servers.

47
Q

Hypertext Transfer Protocol Secure (HTTPS)

A

A network protocol that provides a secure method of communication between clients and servers.

48
Q

IEEE 802.11 (Wi-Fi)

A

A set of standards that define communication for wireless LANs.

49
Q

Network protocols

A

A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data.

50
Q

Network segmentation

A

A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data.

51
Q

Port filtering

A

A firewall function that blocks or allows certain port numbers to limit unwanted communication.

52
Q

Proxy server

A

A server that fulfills the requests of its clients by forwarding them to other servers.

53
Q

Reverse proxy server

A

A server that regulates and restricts the internet’s access to an internal server.

54
Q

Secure File Transfer Protocol (SFTP)

A

A secure protocol used to transfer files from one device to another over a network.

55
Q

Secure shell (SSH)

A

A security protocol used to create a shell with a remote system.

56
Q

Security zone

A

A segment of a company’s network that protects the internal network from the internet.

57
Q

Simple Network Management Protocol (SNMP)

A

A network protocol used for monitoring and managing devices on a network.

58
Q

Stateful

A

A class of firewall that keeps track of information passing through it and proactively filters out threats.

59
Q

Stateless

A

A class of firewall that operates based on predefined rules and does not keep track of information from data packets.

60
Q

Subnetting

A

The subdivision of a network into logical groups called subnets.

61
Q

Transmission Control Protocol (TCP)

A

An internet communication protocol that allows two devices to form a connection and stream data.

62
Q

Uncontrolled zone

A

The portion of the network outside the organization.

63
Q

Virtual private network (VPN)

A

A network security service that changes your public IP address and masks your virtual location so that you can keep your data private when you are using a public network like the internet.

64
Q

User Datagram Protocol (UDP)

A

A connectionless protocol that does not establish a connection between devices before a transmission.

65
Q

Internet Control Message Protocol (ICMP)

A

An internet protocol used by devices to tell each other about data transmission errors across the network.

66
Q

What does ARP stand for?

A

Address Resolution Protocol

67
Q

What does DNS stand for?

A

Domain Name System

68
Q

What does HTTP and HTTPS stand for?

A

Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure

69
Q

What does SFTP stand for?

A

Secure File Transfer Protocol

70
Q

What does SNMP stand for?

A

Simple Network Management Protocol

71
Q

What does TCP stand for?

A

Transmission Control Protocol

72
Q

What does VPN stand for?

A

Virtual private network

73
Q

What does WPA stand for?

A

Wi-Fi Protected Access

74
Q

What does UDP stand for?

A

User Datagram Protocol

75
Q

What does ICMP stand for?

A

Internet Control Message Protocol

76
Q

Baseline configuration (baseline image)

A

A documented set of specifications within a system that is used as a basis for future builds, releases, and updates.

77
Q

Hardware

A

The physical components of a computer.

78
Q

Multi-factor authentication (MFA)

A

A security measure which requires a user to verify their identity in two or more ways to access a system or network.

79
Q

Network log analysis

A

The process of examining network logs to identify events of interest.

80
Q

Patch update

A

A software and operating system update that addresses security vulnerabilities within a program or product.

81
Q

Operating system (OS)

A

The interface between computer hardware and the user.

82
Q

Penetration testing (pen test)

A

A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes.

83
Q

World-writable file

A

A file that can be altered by anyone in the world.

83
Q

Security hardening

A

The process of strengthening a system to reduce its vulnerabilities and attack surface.

84
Q

Brute force attack

A

A trial-and-error process of discovering private information.

85
Q

What are the 2 types of brute force attacks?

A

Simple brute force attacks and Dictionary attacks

86
Q

Simple brute force attacks

A

When attackers try to guess a user’s login credentials. They might do this by entering any combination of usernames and passwords that they can think of until they find the one that works.

87
Q

Dictionary attacks

A

When attackers use a list of commonly used passwords and stolen credentials from previous breaches to access a system. These are called “dictionary” attacks because attackers originally used a list of words from the dictionary to guess the passwords, before complex password rules became a common security practice.

88
Q

What are some common measures organizations use to prevent brute force attacks and similar attacks?

A

Salting and hashing, MFA, CAPTCHA and reCAPTCHA, and password policies.

89
Q

Intrusion detection system (IDS)

A

An application that monitors system activity and alerts on possible intrusions. An IDS alerts administrators based on the signature of malicious traffic.

90
Q

Intrusion prevention system (IPS)

A

An application that monitors system activity for intrusive activity and takes action to stop the activity.

91
Q

Identity access management (IAM)

A

A collection of processes and technologies that helps organizations manage digital identities in their environment.

92
Q

Zero day attack

A

An exploit that was previously unknown.

93
Q

Shared responsibility model

A

A model that states that the Cloud Share Provider (CSP) must take responsibility for security involving the cloud infrastructure, including physical data centers, hypervisors, and host operating systems.

94
Q

What does IAM stand for?

A

Identity access management

95
Q

What does IDS stand for?

A

Intrusion detection system

96
Q

What does IPS stand for?

A

Intrusion prevention system

97
Q

Cloud computing

A

A model for allowing convenient and on-demand network access to a shared pool of configurable computing resources.

98
Q

What does CSP stand for?

A

Cloud service providers