Connect & Protect: Network & Network Security Flashcards

1
Q

The maximum data transmission capacity over a network, measured by bits per second

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The practice of using remote servers, application, and network services that are hosted on the internet instead of on local physical devices

A

Cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet

A

Cloud network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A basic unit of information that travels from one device to another within a network

A

Data packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network device that broadcasts information to every device on the network

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A set of standards used for routing and addressing data packets as they travel between devices on a network

A

Internet Protocol (IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A unique string of characters that identifies the location of a device on the internet

A

Internet Protocol (IP) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network that spans small areas like an office building, a school, or a home

A

Local Area Network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A unique alphanumeric identifier that is assigned to each physical device on a network

A

Media Access Control (MAC) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A device that connects your router to the internet and brings internet access to the LAN

A

Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A group of connected devices

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A standardized concept that describes the seven layers computers use to communicate and send data over the network

A

Open systems interconnection (OSI) model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The practice of capturing and inspecting data packets across a network

A

Packet sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A software-based location that organizes the sending and receiving of data between devices on a network

A

Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network device that connects multiple networks together

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The rate at which a device sends and receives data, measured by bits per second

A

Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A device that makes connections between specific devices on a network by sending and receiving data between them

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A framework used to visualize how data is organized and transmitted across a network

A

TCP/IP model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An internet communication protocol that allows two devices to form a connection and stream data

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A connectionless protocol that does not establish a connection between devices before transmissions

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A network that spans a large geographic area like a city, state, or country

A

Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A network protocol used to determine the MAC address of the next router or device on the path

A

Address Resolution Protocol (ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Software firewalls that are hosted by the cloud service provider

A

Cloud-based firewalls

24
Q

A subnet that protects the internal network from the uncontrolled zone

A

Controlled zone

25
Q

A networking protocol that translates internet domain names into IP addresses

A

Domain Name System (DNS

26
Q

A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets

A

Encapsulation

27
Q

A network security device that monitors traffic to or from your network

A

Firewall

28
Q

A server that regulates and restricts a person’s access to the internet

A

Forward proxy server

29
Q

An application layer protocol that provides a method of communication between clients and website servers

A

Hypertext Transfer Protocol (HTTP

30
Q

A network protocol that provides a secure method of communication between clients and servers

A

Hypertext Transfer Protocol Secure (HTTPS

31
Q

A set of standards that define communication for wireless LANs

A

IEEE 802.11 (Wi-Fi

32
Q

A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data

A

Network protocols

33
Q

A security technique that divides the network into segments

A

Network segmentation

34
Q

A firewall function that blocks or allows certain port numbers to limit unwanted communication

A

Port filtering

35
Q

A server that fulfills the requests of its clients by forwarding them to other servers

A

Proxy server

36
Q

A server that regulates and restricts the internet’s access to an internal server

A

Reverse proxy server

37
Q

Secure File Transfer Protocol (SFTP

A

Secure File Transfer Protocol (SFTP

38
Q

A security protocol used to create a shell with a remote system

A

Secure shell (SSH)

39
Q

A segment of a company’s network that protects the internal network from the internet

A

Security zone

40
Q

A network protocol used for monitoring and managing devices on a network

A

Simple Network Management Protocol (SNMP)

41
Q

A class of firewall that keeps track of information passing through it and proactively filters out threats

A

Stateful

42
Q

A class of firewall that operates based on predefined rules and does not keep track of information from data packets

A

Stateless

43
Q

The subdivision of a network into logical groups called subnets

A

Subnetting

44
Q

An internet communication protocol that allows two devices to form a connection and stream data

A

Transmission Control Protocol (TCP)

45
Q

The portion of the network outside the organization

A

Uncontrolled zone

46
Q

A network security service that changes your public IP address and masks your virtual location so that you can keep your data private when you are using a public network like the internet

A

Virtual private network (VPN)

47
Q

A wireless security protocol for devices to connect to the internet

A

Wi-Fi Protected Access (WPA)

48
Q

A documented set of specifications within a system that is used as a basis for future builds, releases, and updates

A

Baseline configuration (baseline image

49
Q

The physical components of a computer

A

Hardware

50
Q

A security measure which requires a user to verify their identity in two or more ways to access a system or network

A

Multi-factor authentication (MFA

51
Q

The process of examining network logs to identify events of interest

A

Network log analysis

52
Q

The interface between computer hardware and the user

A

Operating system (OS)

53
Q

A software and operating system update that addresses security vulnerabilities within a program or product

A

Patch update

54
Q

A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes

A

Penetration testing (pen test

55
Q

The process of strengthening a system to reduce its vulnerabilities and attack surface

A

Security hardening

56
Q

An application that collects and analyzes log data to monitor critical activities for an organization

A

Security information and event management (SIEM)

57
Q

A file that can be altered by anyone in the world

A

World-writable file