Domain 4 Flashcards
Network Security
two or more
computers linked together to share
data, information or resources
A network
A local area network (LAN) is
a network
typically spanning a single floor or
building. This is commonly a limited
geographical area
Wide area network (WAN) is
the long-distance connections between geographicallyremote networks
used to connect multiple devices in a network. They are wired devices and are not as smart as switches or routers
Hubs are
a network device
used to filter traffic
A firewall
wired devices that know the addresses of the devices connected to them and route traffic to that port/device rather than retransmitting to all devices. They are smarter than hubs, but not as smart as routers
Switches are
A server is
a computer that provides
information to other computers on a
network
Routers are used to
control traffic flow on
networks and are often used to connect
similar networks and control traffic low
between them. They determine the most efficient “route” for the traffic to flow across the network
Endpoints are
the ends of a network
communication link. One end is often at a
server where a resource resides, and the other end is often a client making a request to use a network resource
Ethernet is
a standard
that defines wired connections of
networked devices. This standard defines the way data is
formatted over the wire to ensure
disparate devices can communicate
over the same cables
Every network device is assigned a
a Media
Access Control (MAC) address
What connects all devices behind the firewall in a small business network?
What is a potential drawback associated with the freedom provided by wireless networking?
Additional vulnerabilities
What does micro-segmentation aid in protecting against?
Polymorphic tool sets
An intrusion occurs
when an attacker
is able to bypass or thwart security
mechanisms and gain access to an organization’s resources
Intrusion detection is
a specific form
of monitoring that monitors recorded
information and real-time events to detect
abnormal activity indicating a potential
incident or intrusion
What term describes a portion of the organization’s network that interfaces directly with the outside world and typically has more security controls and restrictions compared to the rest of the internal IT environment?
Demilitarized zone (DMZ)
What is a potential alternative to expensive dedicated point-to-point connections?
How does a Web Application Firewall (WAF) function in a network?
It monitors all traffic from the outside for malicious behavior before passing commands to a web server
What is the primary purpose of Virtual Local Area Networks (VLANs)?
Consolidate traffic across multiple switch ports
VLANs allow network administrators to use switches to create software-based LAN segments, consolidating traffic across multiple switch ports.
Which of the following tools can be used to grant remote users access to the internal IT environment?
VPN (virtual private network)
A VPN allows external users to gain access to the internal environment securely.
What might a user typically need to acknowledge before being allowed to access the internet in a hotel network?
Acceptable use policy
How are VLANs used in Network Access Control (NAC) systems?
VLANs control whether devices connect to the corporate network or a guest network
What is the function of transfer switches or transformers in a redundant power system?
Enable seamless transition between power sources
In a scenario requiring full redundancy, what should devices have in terms of power supplies?
Two power supplies connected to diverse sources
Why is an abnormal system shutdown in a data center a concern?
It may result in the loss or corruption of data
What is network monitoring or sniffing?
Monitoring traffic patterns to obtain information about a network
What is the purpose of the three-way handshake in networking?
Synchronizing and acknowledging requests
What is the three-way handshake?
SYN, SYN-ACK, ACK
request to establish connection, acknowledgment, acknowledge the connection
Well-known ports
Ports 0-1023, related to the common protocols that
are at the core of the Transport Control
Protocol/Internet Protocol (TCP/IP) model, Domain Name Service (DNS), Simple Mail Transfer Protocol (SMTP), etc.