Domain 4 Flashcards

Network Security

1
Q

two or more
computers linked together to share
data, information or resources

A

A network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A local area network (LAN) is

A

a network
typically spanning a single floor or
building. This is commonly a limited
geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wide area network (WAN) is

A

the long-distance connections between geographicallyremote networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

used to connect multiple devices in a network. They are wired devices and are not as smart as switches or routers

A

Hubs are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a network device
used to filter traffic

A

A firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

wired devices that know the addresses of the devices connected to them and route traffic to that port/device rather than retransmitting to all devices. They are smarter than hubs, but not as smart as routers

A

Switches are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A server is

A

a computer that provides
information to other computers on a
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Routers are used to

A

control traffic flow on
networks and are often used to connect
similar networks and control traffic low
between them. They determine the most efficient “route” for the traffic to flow across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Endpoints are

A

the ends of a network
communication link. One end is often at a
server where a resource resides, and the other end is often a client making a request to use a network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ethernet is

A

a standard
that defines wired connections of
networked devices. This standard defines the way data is
formatted over the wire to ensure
disparate devices can communicate
over the same cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Every network device is assigned a

A

a Media
Access Control (MAC) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What connects all devices behind the firewall in a small business network?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a potential drawback associated with the freedom provided by wireless networking?

A

Additional vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does micro-segmentation aid in protecting against?

A

Polymorphic tool sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An intrusion occurs

A

when an attacker
is able to bypass or thwart security
mechanisms and gain access to an organization’s resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intrusion detection is

A

a specific form
of monitoring that monitors recorded
information and real-time events to detect
abnormal activity indicating a potential
incident or intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What term describes a portion of the organization’s network that interfaces directly with the outside world and typically has more security controls and restrictions compared to the rest of the internal IT environment?

A

Demilitarized zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a potential alternative to expensive dedicated point-to-point connections?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does a Web Application Firewall (WAF) function in a network?

A

It monitors all traffic from the outside for malicious behavior before passing commands to a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the primary purpose of Virtual Local Area Networks (VLANs)?

A

Consolidate traffic across multiple switch ports

VLANs allow network administrators to use switches to create software-based LAN segments, consolidating traffic across multiple switch ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following tools can be used to grant remote users access to the internal IT environment?

A

VPN (virtual private network)

A VPN allows external users to gain access to the internal environment securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What might a user typically need to acknowledge before being allowed to access the internet in a hotel network?

A

Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How are VLANs used in Network Access Control (NAC) systems?

A

VLANs control whether devices connect to the corporate network or a guest network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the function of transfer switches or transformers in a redundant power system?

A

Enable seamless transition between power sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In a scenario requiring full redundancy, what should devices have in terms of power supplies?

A

Two power supplies connected to diverse sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Why is an abnormal system shutdown in a data center a concern?

A

It may result in the loss or corruption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is network monitoring or sniffing?

A

Monitoring traffic patterns to obtain information about a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the purpose of the three-way handshake in networking?

A

Synchronizing and acknowledging requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the three-way handshake?

A

SYN, SYN-ACK, ACK

request to establish connection, acknowledgment, acknowledge the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Well-known ports

A

Ports 0-1023, related to the common protocols that
are at the core of the Transport Control
Protocol/Internet Protocol (TCP/IP) model, Domain Name Service (DNS), Simple Mail Transfer Protocol (SMTP), etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Registered ports

A

Ports 1024-49151, often associated with
proprietary applications from vendors and developers. While they are officially
approved by the Internet Assigned
Numbers Authority (IANA), in practice
many vendors simply implement a port of
their choosing. Examples include Remote Authentication Dial-In User Service (RADIUS) authentication (1812), Microsoft SQL Server (1433/1434) and the Docker REST API (2375/2376)

32
Q

Dynamic or private ports

A

Ports 49151 - 65535, Whenever a service is requested that is
associated with well-known or registered
ports, those services will respond with a
dynamic port that is used for that session
and then released.

33
Q

What are well-known ports (0-1023) associated with?

A

Common protocols at the core of TCP/IP

34
Q

What is resource pooling in the context of cloud computing?

A
35
Q

What is a cloud arrangement in which the provider owns and manages the hardware, operating system, and applications in the cloud, while the customer retains ownership of the data?

A
36
Q

What is one of the services offered by many MSPs, where they monitor firewalls and other security tools to provide expertise in triaging events?

A

Managed Detection and Response (MDR) Service

37
Q

Which cloud computing model allows an enterprise to scale up new software or data-based services/solutions quickly without massive hardware installation?

A
38
Q

Which organization’s definition of cloud computing is commonly used globally?

A

National Institute of Standards and Technology (NIST)

39
Q

What is the main purpose of an SLA?

A

To document specific parameters and minimum service levels

40
Q

What distinguishes Memoranda of Understanding (MOU) or Memoranda of Agreement (MOA) from Service Level Agreements (SLA)?

A

MOUs/MOAs are more directly related to what can be done with a system or information, while SLAs specify more intricate aspects of services

41
Q

Application programming interface (API)

A

A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or web tool.

42
Q

Byte

A

The byte is a unit of digital information that most commonly consists of eight bits.

43
Q

Encapsulation

A

Encapsulation
Enforcement of data hiding and code hiding during all phases of software development and operational use. Bundling together data and methods is the process of encapsulation; its opposite process may be called unpacking, revealing, or using other terms. Also used to refer to taking any set of data and packaging it or hiding it in another data structure, as is common in network protocols and encryption.

43
Q

Domain Name Service (DNS)

A

Domain Name Service (DNS)
This acronym can be applied to three interrelated elements: a service, a physical server and a network protocol.

43
Q

File Transfer Protocol (FTP)

A

File Transfer Protocol (FTP)
The internet protocol (and program) used to transfer files between hosts.

44
Q

Fragment attack

A

In a fragment attack, an attacker fragments traffic in such a way that a system is unable to put data packets back together.

45
Q

Infrastructure as a Service (IaaS)

A

The provider of the core computing, storage and network hardware and software that is the foundation upon which organizations can build and then deploy applications. IaaS is popular in the data center where software and servers are purchased as a fully outsourced service and usually billed on usage and how much of the resource is used.

46
Q

Internet Control Message Protocol (ICMP)

A
47
Q

Internet Protocol (IPv4)

A

Standard protocol for transmission of data from source to destinations in packet-switched communications networks and interconnected systems of such networks

48
Q

Man-in-the-Middle

A

An attack where the adversary positions himself in between the user and the system so that he can intercept and alter data traveling between them.

49
Q

Microsegmentation

A

Microsegmentation
Part of a zero-trust strategy that breaks LANs into very small, highly localized zones using firewalls or similar technologies. At the limit, this places firewall at every connection point.

50
Q

Packet

A

Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model.

51
Q

Payload

A

The primary action of a malicious code attack.

52
Q

Platform as a Service (PaaS)

A

The web-authoring or application development middleware environment that allows applications to be built in the cloud before they’re deployed as SaaS assets.

53
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

An information security standard administered by the Payment Card Industry Security Standards Council that applies to merchants and service providers who process credit or debit card transactions.

54
Q

Simple Mail Transport Protocol (SMTP)

A

Simple Mail Transport Protocol (SMTP)
The standard communication protocol for sending and receiving emails between senders and receivers.

54
Q

Software as a Service (SaaS)

A

The cloud customer uses the cloud provider’s applications running within a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings

54
Q

Spoofing

A

Faking the sending address of a transmission to gain illegal entry into a secure system

54
Q

VLAN

A

VLAN
A virtual local area network (VLAN) is a logical group of workstations, servers, and network devices that appear to be on the same LAN despite their geographical distribution.

54
Q

Transport Control Protocol/Internet Protocol (TCP/IP) Model

A

Internetworking protocol model created by the IETF, which specifies four layers of functionality: Link layer (physical communications), Internet Layer (network-to-network communication), Transport Layer (basic channels for connections and connectionless exchange of data between hosts), and Application Layer, where other protocols and user applications programs make use of network services.

54
Q

VPN

A

A virtual private network (VPN), built on top of existing networks, that can provide a secure communications mechanism for transmission between networks.

54
Q

Zenmap

A

The graphical user interface (GUI) for the Nmap Security Scanner, an open-source application that scans networks to determine everything that is connected as well as other information.

54
Q

WLAN

A

A wireless area network (WLAN) is a group of computers and devices that are located in the same vicinity, forming a network based on radio transmissions rather than wired connections. A Wi-Fi network is a type of WLAN.

54
Q

Zero Trust

A

Removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset. Microsegmentation of workloads is a tool of the model.

55
Q

Network model upper layer

A

Application, layers 5-7

56
Q

Network model lower layer

A

Data transport, layers 1-4

57
Q

Network model layer 1

A

Physical layer

58
Q

Network model layer 2

A

Data link

59
Q

Network model layer 3

A

Network

60
Q

Network model layer 4

A

Transport

61
Q

Network model layer 5

A

Session

62
Q

Network model layer 6

A

Presentation

63
Q

Network model layer 7

A

Application

64
Q

What is the primary responsibility of the upper layer (host or application layer) in a network model?

A

Transforming data into a format that any system can understand

65
Q

Which layer of the OSI model corresponds to the Internet Layer in the TCP/IP protocol architecture?

A

Network Layer

66
Q

What protocol is often used by embedded systems when connected to a corporate network?

A

TCP/IP

67
Q
A