LESSON5 Flashcards

1
Q

is the protection of the underlying networking
infrastructure from unauthorized access, misuse, or theft.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

involves creating a secure infrastructure for devices, users, and applications to work in a secure manner.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network security combines _______ at the edge and in the network.

A

multiple layers of defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Each network security layer implements ________.

A

policies and controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ gain access to network resources, but ________ are blocked from carrying out exploits and threats.

A

Authorized users ; malicious actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does network security work?

A
  • Network security combines multiple layers of defenses at the edge and in the network.
  • Each network security layer implements policies and controls.
  • Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Is an organization’s set of rules regarding how to handle and protect sensitive data
    (Ps A S R D W Phs)
A

Physical security
Acceptable use of applications
Safeguarding data
Remote access to the network
Data center
Wireless security
Protecting the Hardware and Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Malicious programs that have many different capabilities.
A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Malware ( V W B P R R R T )

A

Virus
Worm
Botnets
Polymorphic
Ransomware
Remote Administration Tools (RATs)
Rootkits
Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Programs that copy themselves throughout a computer or network.

A
  1. Virus –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Self-replicating viruses the exploits security vulnerabilities to automatically spread themselves across the computers and networks.

A
  1. Worm –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Short for “robot network,” these are networks of infected computers under the control of single attacking parties using command and control servers.

A
  1. Botnets –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a type of malware with the capacity to “morph” regularly, altering the appearance of the code while retaining the algorithm within.

A
  1. Polymorphic –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is a criminal business model that uses malicious software to hold valuable files, data or information.

A
  1. Ransomware –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software that allows a remote operator to control a system. These tools were originally built for legitimate use, but are now used by bad actors.

A
  1. Remote Administration Tools (RATs) –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Programs that provide privileged (root-level) access to a computer. _____ vary and hide themselves in the operating system.

A
  1. Rootkits –
17
Q

Malware disguised in what appears to be legitimate software.

A
  1. Trojan –
18
Q
  • The primary method of keeping bad actors out of a network.
19
Q
  • Placed between a private LAN and the public Internet.
20
Q
  • Can be a hardware device or it can be software.
21
Q
  • Can filter packets based on source address, destination address, port numbers, and other criteria.
22
Q

Firewall Topologies (B D D)

A
  1. Bastion host topology
  2. Dual-homed bastion
  3. Demilitarized zone(DMZ)
23
Q

consists of a packet filtering router that forwards all incoming packets to the firewall software on a bastion host. Through this topology, the firewall is placed between the internet and the internal network segment.
Once the firewall is compromised, there is no impediment for the attacker to access the protected network.

A
  1. Bastion host topology–
24
Q

It has two network adapter cards in it and two IP addresses, one for each network it is connected to.

A
  1. Dual-homed bastion–
25
consists of two packet filtering routers that is most secure firewall solution.
3. Demilitarized zone(DMZ) –
26
-Classify IP packets and filters that enable network administrators to control which routing updates or packets are permitted or denied in or out of a network and provide extra security for the network.
Access Control List
27
PORTS Number (20 -161)
20 TCP UDP 21 TCP 23 TCP UDP 25 TCP 53 TCP UDP 67 and 68 UDP 69 UDP 80 TCP 109 TCP 110 TCP 161 UDP
28
20 TCP UDP
FTP data transfer
29
21 TCP
FTP control (command)
30
23 TCP UDP
Telnet protocol
31
25 TCP
Simple Mail Transfer Protocol (SMTP)
32
53 TCP UDP
Domain Name System (DNS)
33
67 and 68 UDP
Dynamic Host Configuration Protocol (DHCP)
34
69 UDP
Trivial File Transfer Protocol (TFTP)
35
80 TCP
Hypertext Transfer Protocol (HTTP)
36
109 TCP
Post Office Protocol v2 (POP2)
37
110 TCP
Post Office Protocol v3 (POP3)
38
161 UDP
Simple Network Management Protocol (SNMP)