Course 003 Glossary Flashcards

1
Q

Define Active packet sniffing

A

A type of attack where data packets are manipulated in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Address Resolution Protocol (ARP)

A

Used to determine the MAC address of the next router or device to traverse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Bandwidth

A

The maximum data transmission capacity over a network, measured by bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Baseline configuration

A

A documented set of specifications within a system that is used as a basis for future builds, releases, and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Bluetooth

A

Used for wireless communication with nearby physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Botnet

A

A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot herder”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Cloud-based firewalls

A

Software firewalls that are hosted by the cloud service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Cloud computing

A

The practice of using remote servers, application, and network services that are hosted on the internet instead of on local physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Cloud network

A

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Controlled zone

A

A subnet that protects the internal network from the uncontrolled zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Data packet

A

A basic unit of information that travels from one device to another within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Denial of service (DoS) attack

A

An attack that targets a network or server and floods
it with network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Distributed denial of service (DDoS) attack

A

A type of denial of service attack that uses multiple devices or servers located in different locations to flood the target network with unwanted traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Domain Name System (DNS)

A

Domain Name System (DNS): A networking protocol that translates internet domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Encapsulation

A

A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define File Transfer Protocol (FTP)

A

Used to transfer files from one device to another over a
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define Firewall

A

A network security device that monitors traffic to or from your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define Forward proxy server

A

A server that regulates and restricts a person’s access to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define Hardware

A

The physical components of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define Hub

A

A network device that broadcasts information to every device on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define Hypertext Transfer Protocol (HTTP)

A

An application layer protocol that provides a method of communication between clients and website servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define Hypertext Transfer Protocol Secure (HTTPS)

A

A network protocol that provides a secure method of communication between clients and servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define Identity and access management (IAM)

A

A collection of processes and technologies that helps organizations manage digital identities in their environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define IEEE 802.11 (Wi-Fi)

A

A set of standards that define communication for wireless LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define Internet Control Message Protocol (ICMP)

A

An internet protocol used by devices to tell each other about data transmission errors across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define Internet Control Message Protocol (ICMP) flood

A

A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define Internet Protocol (IP)

A

A set of standards used for routing and addressing data
packets as they travel between devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define Internet Protocol (IP) address

A

A unique string of characters that identifies the
location of a device on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define IP spoofing

A

A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network

30
Q

Define Local area network (LAN)

A

A network that spans small areas like an office building, a
school, or a home

31
Q

Define Media Access Control (MAC) address

A

A unique alphanumeric identifier that is
assigned to each physical device on a network

32
Q

Define Modem

A

A device that connects your router to the internet and brings internet access to the LAN

33
Q

Define Multi-factor authentication (MFA)

A

A security measure that requires a user to verify their identity in two or more ways to access a system or network

34
Q

Define Network

A

A group of connected devices

35
Q

Define Network log analysis

A

The process of examining network logs to identify events of interest

36
Q

Define Network protocols

A

A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data

37
Q

Define Network segmentation

A

A security technique that divides the network into segments

38
Q

Define Operating system (OS)

A

The interface between computer hardware and the user

39
Q

Define Open systems interconnection (OSI) model

A

A standardized concept that describes the seven layers computers use to communicate and send data over the network

40
Q

Define On-path attack

A

An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit

41
Q

Define Packet sniffing

A

The practice of capturing and inspecting data packets across a network

42
Q

Define Passive packet sniffing

A

A type of attack where a malicious actor connects to a
network hub and looks at all traffic on the network

43
Q

Define Patch update

A

A software and operating system update that addresses security vulnerabilities within a program or product

44
Q

Define Penetration testing

A

A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes

45
Q

Define Ping of death

A

A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB

46
Q

Define Port

A

A software-based location that organizes the sending and receiving of data between devices on a network

47
Q

Define Port filtering

A

A firewall function that blocks or allows certain port numbers to limit unwanted communication

48
Q

Define Proxy server

A

A server that fulfills the requests of its clients by forwarding them to other servers

49
Q

Define Replay attack

A

A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time

50
Q

Define Reverse proxy server

A

A server that regulates and restricts the Internet’s access to an internal server

51
Q

Define Router

A

A network device that connects multiple networks together

52
Q

Define Secure File Transfer Protocol (SFTP)

A

A secure protocol used to transfer files from one device to another over a network

53
Q

Define Secure shell (SSH)

A

A security protocol used to create a shell with a remote system

54
Q

Define Security hardening

A

The process of strengthening a system to reduce its vulnerabilities and attack surface

55
Q

Define Security information and event management (SIEM)

A

An application that collects and analyzes log data to monitor critical activities for an organization

56
Q

Define Security zone

A

A segment of a company’s network that protects the internal network from the internet

57
Q

Define Simple Network Management Protocol (SNMP)

A

A network protocol used for monitoring and managing devices on a network

58
Q

Define Smurf attack

A

A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with ICMP packets

59
Q

Define Speed

A

The rate at which a device sends and receives data, measured by bits per second

60
Q

Define Stateful

A

A class of firewall that keeps track of information passing through it and proactively filters out threats

61
Q

Define Stateless

A

A class of firewall that operates based on predefined rules and that does not keep track of information from data packets

62
Q

Define Subnetting

A

The subdivision of a network into logical groups called subnets

63
Q

Define Switch

A

A device that makes connections between specific devices on a network by sending and receiving data between them

64
Q

Define Synchronize (SYN) flood attack

A

A type of DoS attack that simulates a TCP/IP
connection and floods a server with SYN packets

65
Q

Define TCP/IP model

A

A framework used to visualize how data is organized and transmitted across a network

66
Q

Define Transmission Control Protocol (TCP)

A

An internet communication protocol that allows
two devices to form a connection and stream data

67
Q

Define Transmission control protocol (TCP) 3-way handshake

A

A three-step process used to establish an authenticated connection between two devices on a network

68
Q

Define Uncontrolled zone

A

The portion of the network outside the organization

69
Q

Define User Datagram Protocol (UDP)

A

A connectionless protocol that does not establish a
connection between devices before transmissions

70
Q

Define Virtual Private Network (VPN)

A

A network security service that changes your public IP
address and masks your virtual location so that you can keep your data private when you are using a public network like the internet

71
Q

Define Wide Area Network (WAN)

A

A network that spans a large geographic area like a city,
state, or country

72
Q

Define Wi-Fi Protected Access (WPA)

A

A wireless security protocol for devices to connect to
the internet