Domain 4 Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Network?

A

A group of interconnected devices that can communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Firewall?

A

A security device or software that monitors and controls incoming and outgoing network traffic based on rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Router?

A

A device that connects different networks and routes traffic between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Switch?

A

A device that connects devices within a single network and forwards traffic based on MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Proxy Server?

A

A server that acts as an intermediary for requests between clients and other servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a VPN (Virtual Private Network)?

A

A secure, encrypted connection over a less secure network, typically the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Intrusion Detection System (IDS)?

A

A device or software that monitors network traffic for suspicious activity and alerts administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Intrusion Prevention System (IPS)?

A

A system that actively monitors and can take action to block or prevent detected threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Port Scanning?

A

The process of sending packets to specific ports on a host to discover open ports and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Malware?

A

Malicious software designed to damage, disrupt, or gain unauthorized access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Phishing?

A

A social engineering attack that tricks individuals into revealing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Man-in-the-Middle (MITM) Attack?

A

An attack where a malicious actor intercepts communication between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Denial of Service (DoS)?

A

An attack intended to shut down a network or service, making it inaccessible to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Distributed Denial of Service (DDoS)?

A

An attack that uses multiple compromised systems to flood a target with traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a VLAN (Virtual Local Area Network)?

A

A logical segmentation of a network to improve management and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Encryption?

A

The process of converting information into a secure format to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Decryption?

A

The process of converting encrypted data back into its original form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a DMZ (Demilitarized Zone)?

A

A physical or logical subnet that separates an internal network from untrusted external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Honeypot?

A

A decoy system or resource intended to attract attackers and study their methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Wireless Access Point (WAP)?

A

A device that allows wireless devices to connect to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Network Segmentation?

A

Dividing a network into multiple segments to enhance performance and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Public Key?

A

A cryptographic key that can be shared openly and is used for encryption or verifying digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Private Key?

A

A cryptographic key kept secret and used for decryption or creating digital signatures.

25
Q

What is a Certificate Authority (CA)?

A

An entity that issues digital certificates to verify identities online.

26
Q

What is Secure Sockets Layer (SSL)?

A

A protocol for encrypting information over the internet (now replaced mostly by TLS).

27
Q

What is Transport Layer Security (TLS)?

A

The successor to SSL, providing secure communication over a network.

28
Q

What is WPA2 (Wi-Fi Protected Access 2)?

A

A security protocol used to secure wireless networks.

29
Q

What is WPA3?

A

The latest and most secure Wi-Fi security standard.

30
Q

What is MAC Address Filtering?

A

A method of network access control where only approved device MAC addresses can connect.

31
Q

What is IP Spoofing?

A

An attack technique where the attacker sends packets with a forged source IP address.

32
Q

What is an ARP Spoofing Attack?

A

A type of attack where an attacker sends fake ARP messages to a network to redirect traffic.

33
Q

What is a Botnet?

A

A network of infected devices controlled remotely by an attacker.

34
Q

What is a Security Information and Event Management (SIEM) System?

A

A tool that collects, analyzes, and manages security event data.

35
Q

What is a Zero Trust Model?

A

A security concept where no device or user is trusted by default, even if inside the network.

36
Q

What is the primary purpose of a firewall?

A

To block unauthorized access while permitting legitimate communication.

37
Q

What is the difference between IDS and IPS?

A

IDS monitors and alerts; IPS monitors and actively blocks threats.

38
Q

What is the benefit of network segmentation?

A

It limits the spread of attacks and improves network performance.

39
Q

What is a brute force attack?

A

An attack that tries many passwords or keys until the correct one is found.

40
Q

What does VPN encryption protect against?

A

Eavesdropping and data interception on insecure networks.

41
Q

What is a common sign of a phishing attack?

A

An unexpected email asking for sensitive information or urging urgent action.

42
Q

What is the purpose of a DMZ?

A

To expose external-facing services while protecting the internal network.

43
Q

How does TLS differ from SSL?

A

TLS is the updated, more secure version of SSL.

44
Q

Why is WPA3 stronger than WPA2?

A

It uses stronger encryption and protects against password guessing attacks.

45
Q

What does SIEM provide to cybersecurity teams?

A

Centralized monitoring, analysis, and response to security events.

46
Q

How can a honeypot help network security?

A

It distracts attackers and helps study their behavior.

47
Q

What is the goal of a DDoS attack?

A

To overwhelm a system with traffic and cause a denial of service.

48
Q

How does IP spoofing assist attackers?

A

It disguises their identity and may bypass security controls.

49
Q

How can VLANs improve network security?

A

By isolating sensitive devices or traffic from the rest of the network.

50
Q

What is the advantage of using a VPN for remote work?

A

It provides secure, encrypted access to organizational resources.

51
Q

What are examples of wireless security best practices?

A

Use WPA3, disable WPS, change default settings, and use strong passwords.

52
Q

How does Zero Trust protect an organization?

A

By verifying every access attempt regardless of location or device.

53
Q

What is the role of a Certificate Authority (CA) in network security?

A

To issue trusted digital certificates verifying identities.

54
Q

What is the risk of weak Wi-Fi passwords?

A

They allow unauthorized access to the network and potentially to internal systems.

55
Q

What is a side effect of poor network segmentation?

A

A single breach can expose the entire network.

56
Q

Why is encryption critical for wireless communications?

A

Wireless transmissions can be intercepted; encryption protects the data.

57
Q

What action should you take during a suspected MITM attack?

A

Immediately disconnect and alert security personnel.

58
Q

How can SIEM systems assist during an incident response?

A

They provide centralized data and alerts for quicker investigation and mitigation.