Module 3 Flashcards

1
Q

What is Checkpoint.com?

A

Shows a live cyber threat map.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are switches in a network?

A

Switches: help connect network segments together to allow for device connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Servers/Clients in regards to networking?

A

Servers/Clients: are devices that transfer messages over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Transmission Medium?

A

Transmission Medium: is the medium used to transmit data over the network. This could be
ethernet, fiber, wireless, or various other mediums.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is router?

A

Router: connect different networks by forwarding data packets between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a modem?

A

Modem: (stands for modulator/demodulator) are responsible for converting signals between
different mediums. For example, converting fiber to ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Endpoint Device?

A

Endpoint devices: Where messages on a network originated from and are received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a server?

A

Server: Devices that transfer messages over the network and facilitate communication
between end devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a network?

A

Network: A group of devices connected to allow the sharing of data and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a packet?

A

Packet: Pieces of information (data) sent across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a protocol?

A

Protocol: Predefined sets of rules describing how something should work or behave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a LAN?

A

Local Area Network (LAN): A type of network infrastructure which connects users and end devices located in a small geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a MAN?

A

Metropolitan Area Network (MAN): A type of network infrastructure that spans across a city or a metropolitan area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a WAN?

A

Wide Area Network (WAN): A collection of LANs spread over a large geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is there a PAN?

A

Personal Area Network (PAN): A small network of two personal devices using wireless technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Defense in Depth?

A

Defense in Depth: cybersecurity strategy that involves implementing multiple layers of security controls to protect against various types of threats.

17
Q

What is the CIA Triad?

A

The CIA triad represents the three pillars of information security: confidentiality, integrity, and availability, as follows:

Confidentiality – preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information

Integrity — guarding against improper information modification or destruction and ensuring information non-repudiation and authenticity

Availability – ensuring timely and reliable access to and use of information

18
Q

What is the NIST cybersecurity framework?

A

Identify – develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities

Protect – develop and implement appropriate safeguards to ensure delivery of critical services

Detect – develop and implement appropriate activities to identify the occurrence of a cybersecurity event

Respond – develop and implement appropriate activities to take action regarding a detected cybersecurity incident

Recover – develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident

19
Q

What is ARP poisoning?

A

ARP Poisoning: An attack that compromises the address resolution process of a local
machine

19
Q

What is a network attack?

A

Network attacks: are malicious activities aimed at disrupting or gaining unauthorized access to computer networks.

19
Q

What is DoS? (Denial of Service)

A

Denial-of-Service (DoS): An attack that causes a service to fail by flooding the target with traffic or sending information that triggers a service crash

20
Q

What is Distributed DoS?

A

Distributed DoS: A DoS attack that is distributed among multiple sources to create a more
considerable amount of traffic.

21
Q

What is Exploit?

A

Exploit: techniques or code blocks designed to take advantage of software vulnerabilities

22
Q

What is Data in Transit?

A

Data in transit: Data moving from one location to another.

23
Q

What is Data at rest?

A

Data at rest: Data that is being stored or archived.

24
Q

What is data in use?

A

Data at rest: Data that is being stored or archived.

25
Q

What is data encryption?

A

Data encryption is the process of converting information into a secret code (or cipher) to hide its meaning. Using a specialized encryption algorithm, companies can encode their data so it becomes indecipherable to anyone but the intended recipient, who relies on another encryption algorithm on their end to decode the information.

The practice of encryption goes back to 4000 BC, when the ancient Egyptians used hieroglyphics to communicate with each other in a way only they would understand. Today, encryption has been adopted by businesses, governments and consumers to protect data stored on their computing systems, as well as information that flows in and out of their organizations.

This latter point is especially relevant for global organizations, with the EU laying out new guidelines on compliance for data exchanged between the United States and EU member states.[1] Data security and compliance requirements will only become more stringent and complex, requiring an equally sophisticated security approach.

26
Q

What are the 3 states of data?

A

ike oil, data can exist in multiple states, and it can quickly change states based on a company’s needs – for instance, when a finance controller needs to access sensitive revenue data that would otherwise be stored on a static database.

The first step in choosing the right encryption strategy is to understand the differences between three different states of data – in transit, at rest and in use – and the security challenges posed by each

27
Q

How do you protect data in motion?

A

Identify critical assets and their vulnerabilities
Define your organization’s framework for data security
Implement the necessary technologies and processes to protect your data in motion

28
Q

How do you protect data at rest?

A

Use security software
Implement firewalls
Use encryption
Deploy data loss prevention solutions

29
Q

How does the role of encryption in protecting the 3 data types?

A

While the risk profile for data in transit and data in use is higher than when it’s at rest, attackers regularly target information in all three states. As opportunists, they will look for any assets or intellectual property that are easy to breach. Encryption plays an integral role in a company’s defenses across all three states of data, be it protecting sensitive information while it’s being accessed or moved or encrypting files before storing them for an added layer of security against attacks on its internal servers.

30
Q

Why is encryption important?

A

Encrypting data turns your actual data into ciphertext and protects it from being read. Even if cyber criminals intercept your data, they won’t be able to view it. Data encryption is a surefire way to enhance security and protect your organization’s valuable data.

31
Q

What is segmentation?

A

Segmentation: Dividing networks into multiple segments or zones

32
Q

What is segregation?

A

Segregation: The process of isolating parts of a network from each other

33
Q

What is a firewall?

A

Firewall: A hardware or software entity designed to protect one network from another

34
Q

What is the zero Trust strategy?

A

Zero Trust assumes nobody is trustworthy by default, even those already inside the network perimeter. Zero Trust works on the principle of a “protect surface” built around the organization’s most critical and valuable DAAS. Because it contains only what’s most critical to business operations, the protect surface is orders of magnitude smaller than the attack surface of the full network perimeter.

This is where network segmentation comes in. Using segmentation, network architects can construct a microperimeter around the protect surface, essentially forming a second line of defense. In some instances, virtual firewalls can automate security provisioning to simplify segmenting tasks. However it is accomplished, authorized users can access assets within the protect surface while all others are barred by default.

Segmentation is bad news for attackers because, unlike in the days of assumed trust, simply penetrating the perimeter isn’t enough to gain access to sensitive information. Microperimeters, whether physical or virtual, prevent threats from moving laterally within the network, essentially negating much of the work that went into creating the initial breach (see figure 2).

35
Q
A