LESSON5 Flashcards

1
Q

is the protection of the underlying networking
infrastructure from unauthorized access, misuse, or theft.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

involves creating a secure infrastructure for devices, users, and applications to work in a secure manner.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network security combines _______ at the edge and in the network.

A

multiple layers of defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Each network security layer implements ________.

A

policies and controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ gain access to network resources, but ________ are blocked from carrying out exploits and threats.

A

Authorized users ; malicious actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does network security work?

A
  • Network security combines multiple layers of defenses at the edge and in the network.
  • Each network security layer implements policies and controls.
  • Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Is an organization’s set of rules regarding how to handle and protect sensitive data
    (Ps A S R D W Phs)
A

Physical security
Acceptable use of applications
Safeguarding data
Remote access to the network
Data center
Wireless security
Protecting the Hardware and Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Malicious programs that have many different capabilities.
A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Malware ( V W B P R R R T )

A

Virus
Worm
Botnets
Polymorphic
Ransomware
Remote Administration Tools (RATs)
Rootkits
Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Programs that copy themselves throughout a computer or network.

A
  1. Virus –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Self-replicating viruses the exploits security vulnerabilities to automatically spread themselves across the computers and networks.

A
  1. Worm –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Short for “robot network,” these are networks of infected computers under the control of single attacking parties using command and control servers.

A
  1. Botnets –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a type of malware with the capacity to “morph” regularly, altering the appearance of the code while retaining the algorithm within.

A
  1. Polymorphic –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is a criminal business model that uses malicious software to hold valuable files, data or information.

A
  1. Ransomware –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software that allows a remote operator to control a system. These tools were originally built for legitimate use, but are now used by bad actors.

A
  1. Remote Administration Tools (RATs) –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Programs that provide privileged (root-level) access to a computer. _____ vary and hide themselves in the operating system.

A
  1. Rootkits –
17
Q

Malware disguised in what appears to be legitimate software.

A
  1. Trojan –
18
Q
  • The primary method of keeping bad actors out of a network.
A

Firewalls

19
Q
  • Placed between a private LAN and the public Internet.
A

Firewalls

20
Q
  • Can be a hardware device or it can be software.
A

Firewalls

21
Q
  • Can filter packets based on source address, destination address, port numbers, and other criteria.
A

Firewalls

22
Q

Firewall Topologies (B D D)

A
  1. Bastion host topology
  2. Dual-homed bastion
  3. Demilitarized zone(DMZ)
23
Q

consists of a packet filtering router that forwards all incoming packets to the firewall software on a bastion host. Through this topology, the firewall is placed between the internet and the internal network segment.
Once the firewall is compromised, there is no impediment for the attacker to access the protected network.

A
  1. Bastion host topology–
24
Q

It has two network adapter cards in it and two IP addresses, one for each network it is connected to.

A
  1. Dual-homed bastion–
25
Q

consists of two packet filtering routers that is most secure firewall solution.

A
  1. Demilitarized zone(DMZ) –
26
Q

-Classify IP packets and filters that enable network administrators to control which routing updates or packets are permitted or denied in or out of a network and provide extra security for the network.

A

Access Control List

27
Q

PORTS Number (20 -161)

A

20 TCP UDP
21 TCP
23 TCP UDP
25 TCP
53 TCP UDP
67 and 68 UDP
69 UDP
80 TCP
109 TCP
110 TCP
161 UDP

28
Q

20 TCP UDP

A

FTP data transfer

29
Q

21 TCP

A

FTP control (command)

30
Q

23 TCP UDP

A

Telnet protocol

31
Q

25 TCP

A

Simple Mail Transfer Protocol (SMTP)

32
Q

53 TCP UDP

A

Domain Name System (DNS)

33
Q

67 and 68 UDP

A

Dynamic Host Configuration Protocol (DHCP)

34
Q

69 UDP

A

Trivial File Transfer Protocol (TFTP)

35
Q

80 TCP

A

Hypertext Transfer Protocol (HTTP)

36
Q

109 TCP

A

Post Office Protocol v2 (POP2)

37
Q

110 TCP

A

Post Office Protocol v3 (POP3)

38
Q

161 UDP

A

Simple Network Management Protocol (SNMP)