Domain 4 Flashcards

Network Security

1
Q

API

A

Application Programming Interface. Set of routines, standards protocols, & tools for building software applications to access web-based software applications/web tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bit

A

most essential representation of data (zero or one) at Layer 1 of the Open Systems Interconnection (OSI) model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Broadcast

A

transmission is a one-to-many (one-to-everyone) form of sending internet traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Byte

A

unit of digital information that most commonly consists of eight bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud Computing

A

model for enabling ubiquitous, convenient, on-demand network access to a shared pool of computing resources (networks, servers, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Community Cloud

A

system which cloud infrastructure is for exclusive use for specific group of consumers with shared concerns. Owned/Managed/Operated by 1+ organizations, third party, or combination on/off premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

De-encapsulation

A

opposite process of encapsulation, bundles of data are unpacked/revealed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DoS

A

Denial-of-Service. Prevention of authorized access to resources or delaying of time-critical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS

A

Domain Name Service. Service, physical server, & network protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encapsulation

A

bundling together data & methods. Taking any set of data & packaging it/hiding it in another data structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption

A

process & act of converting the message from its plaintext to ciphertext. “Enciphering”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

File Transfer Protocol

A

internet protocol/program used to transfer files between hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fragment Attack

A

attacker fragments traffic in a way where the system is unable to put packets back together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hardware

A

physical parts of computer & related devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hybrid Cloud

A

combination of public cloud storage & private where critical data is in private & other data is public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IaaS

A

Infrastructure as a Service. Provider of core computing, storage, & network hardware/software as foundation for organizations can build/deploy applications. Popular in data centers, purchased as outsourced service billed on usage

17
Q

ICMP

A

Internet Control Message Protocol. IP network protocol standardized by IETF (Internet Engineering Task Force) through RFC 792 to determine if a particular service/host is available

18
Q

IPv4

A

Internet Protocol. Standard for transmission of data from source to destinations in packet-switched communications networks & interconnected systems

19
Q

Man-in-the-Middle

A

attack where threat positions itself between user & system to intercept/alter data traveling between

20
Q

Microsegmentation

A

part of zero-trust strategy that breaks LANs into small, localized zones using firewalls or similar technology. Places firewall at every connection point (ideal)

21
Q

Oversized Packets Attack

A

purposely sending network packet larger than expected/can be handled, causing receiving system to fail unexpectedly

22
Q

Packet

A

Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model

23
Q

Payload

A

primary action of malicious code attack

24
Q

PCI DSS

A

Payment Card Industry Data Security Standard. IS Standard administered by PCI SSC (council) that applies to merchants/service providers who process card transactions

25
PaaS
Platform as a Service. Web-authoring/application development middleware environment that allows applications to be built in cloud before they're deployed as SaaS assets
26
Private Cloud
cloud computing environment in which all hardware & software resources are dedicated exclusively to a single customer
27
Protocols
set of rules (formats & procedure) to implement & control some type of association (communication) between systems
28
Public Cloud
on-demand computing service/infrastructure managed by third-party provider & shared with multiple organization using the public internet
29
SMTP
Simple Mail Transport Protocol. Standard communication protocol for sending/receiving email between senders & receivers
30
Software
computer programs & associated data that may be dynamically written/modified during execution
31
SaaS
Software as a Service. Customer uses cloud provider's applications running within a cloud infrastructure. Customer/Consumer doesn't manage/control underlying cloud infrastructure
32
Spoofing
Faking the sending address of a transmission to gain illegal entry into secure system
33
TCP/IP Model
Transport Control Protocol/Internet Protocol. Internetworking protocol model created by the IETF which specifies four layers of functionality. Link Layers (physical communication) Internet Layer (network-to-network communication) Transport Layer (basic channel for connections/connectionless exchange of data between hosts) Application Layer (where other protocols/user applications programs access network services)
34
VLAN
Virtual Local Area Network. Workstations, servers, & network devices appear to be on the same LAN (Local Area Network) despite actual geographical distribution
35
VPN
Virtual Private Network. Built on top of existing network that can provide a secure communications mechanism for transmission between networks
36
WLAN
Wireless Local Area Network. Group of computers & devices that are located in the same vicinity, forming a network based on radio transmissions rather than wired | Wi-Fi network is type of WLAN
37
Zenmap
graphical user interface (GUI) for Nmap Security Scanner, an open-source application that scans network to determine everything that is connected to it
38
Zero Trust
removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset. Micro-segmentation of workloads is a tool of the model