Domain 4 Flashcards

Network Security

You may prefer our related Brainscape-certified flashcards:
1
Q

API

A

Application Programming Interface. Set of routines, standards protocols, & tools for building software applications to access web-based software applications/web tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bit

A

most essential representation of data (zero or one) at Layer 1 of the Open Systems Interconnection (OSI) model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Broadcast

A

transmission is a one-to-many (one-to-everyone) form of sending internet traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Byte

A

unit of digital information that most commonly consists of eight bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud Computing

A

model for enabling ubiquitous, convenient, on-demand network access to a shared pool of computing resources (networks, servers, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Community Cloud

A

system which cloud infrastructure is for exclusive use for specific group of consumers with shared concerns. Owned/Managed/Operated by 1+ organizations, third party, or combination on/off premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

De-encapsulation

A

opposite process of encapsulation, bundles of data are unpacked/revealed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DoS

A

Denial-of-Service. Prevention of authorized access to resources or delaying of time-critical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS

A

Domain Name Service. Service, physical server, & network protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encapsulation

A

bundling together data & methods. Taking any set of data & packaging it/hiding it in another data structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption

A

process & act of converting the message from its plaintext to ciphertext. “Enciphering”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

File Transfer Protocol

A

internet protocol/program used to transfer files between hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fragment Attack

A

attacker fragments traffic in a way where the system is unable to put packets back together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hardware

A

physical parts of computer & related devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hybrid Cloud

A

combination of public cloud storage & private where critical data is in private & other data is public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IaaS

A

Infrastructure as a Service. Provider of core computing, storage, & network hardware/software as foundation for organizations can build/deploy applications. Popular in data centers, purchased as outsourced service billed on usage

17
Q

ICMP

A

Internet Control Message Protocol. IP network protocol standardized by IETF (Internet Engineering Task Force) through RFC 792 to determine if a particular service/host is available

18
Q

IPv4

A

Internet Protocol. Standard for transmission of data from source to destinations in packet-switched communications networks & interconnected systems

19
Q

Man-in-the-Middle

A

attack where threat positions itself between user & system to intercept/alter data traveling between

20
Q

Microsegmentation

A

part of zero-trust strategy that breaks LANs into small, localized zones using firewalls or similar technology. Places firewall at every connection point (ideal)

21
Q

Oversized Packets Attack

A

purposely sending network packet larger than expected/can be handled, causing receiving system to fail unexpectedly

22
Q

Packet

A

Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model

23
Q

Payload

A

primary action of malicious code attack

24
Q

PCI DSS

A

Payment Card Industry Data Security Standard. IS Standard administered by PCI SSC (council) that applies to merchants/service providers who process card transactions

25
Q

PaaS

A

Platform as a Service. Web-authoring/application development middleware environment that allows applications to be built in cloud before they’re deployed as SaaS assets

26
Q

Private Cloud

A

cloud computing environment in which all hardware & software resources are dedicated exclusively to a single customer

27
Q

Protocols

A

set of rules (formats & procedure) to implement & control some type of association (communication) between systems

28
Q

Public Cloud

A

on-demand computing service/infrastructure managed by third-party provider & shared with multiple organization using the public internet

29
Q

SMTP

A

Simple Mail Transport Protocol. Standard communication protocol for sending/receiving email between senders & receivers

30
Q

Software

A

computer programs & associated data that may be dynamically written/modified during execution

31
Q

SaaS

A

Software as a Service. Customer uses cloud provider’s applications running within a cloud infrastructure. Customer/Consumer doesn’t manage/control underlying cloud infrastructure

32
Q

Spoofing

A

Faking the sending address of a transmission to gain illegal entry into secure system

33
Q

TCP/IP Model

A

Transport Control Protocol/Internet Protocol. Internetworking protocol model created by the IETF which specifies four layers of functionality.
Link Layers (physical communication)
Internet Layer (network-to-network communication)
Transport Layer (basic channel for connections/connectionless exchange of data between hosts)
Application Layer (where other protocols/user applications programs access network services)

34
Q

VLAN

A

Virtual Local Area Network. Workstations, servers, & network devices appear to be on the same LAN (Local Area Network) despite actual geographical distribution

35
Q

VPN

A

Virtual Private Network. Built on top of existing network that can provide a secure communications mechanism for transmission between networks

36
Q

WLAN

A

Wireless Local Area Network. Group of computers & devices that are located in the same vicinity, forming a network based on radio transmissions rather than wired

Wi-Fi network is type of WLAN

37
Q

Zenmap

A

graphical user interface (GUI) for Nmap Security Scanner, an open-source application that scans network to determine everything that is connected to it

38
Q

Zero Trust

A

removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset. Micro-segmentation of workloads is a tool of the model