Network Flashcards

1
Q

What is Firewalls?

A

Acts as a gatekeeper to enforce access policies between networks, deciding which traffic should be allowed or blocked based on predefined rules. It can operate at various levels of the OSI model, often at the network or application layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is IDS

A

Does not block traffic; it monitors network traffic to detect suspicious activities and potential threats. It then alerts the system administrators without actively intervening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP

A

Transmission - Manages data transmission.
Control - Controls how data packets are sent.
Protocol - Protocol suite for the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IP

A

Internet Protocol handles the addressing and routing of packets to ensure they reach the right destination. Every device connected to the internet has at least one IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Differences between HTTP & HTTPS

A

HyperText Transfer Protocol is the foundation of data communication for the World Wide Web. It defines how messages are formatted and transmitted, and how web servers and browsers should respond to various commands.

HTTPS (HyperText Transfer Protocol Secure) is an extension of HTTP that uses encryption (SSL/TLS) to secure communications between a user’s browser and a web server. This is crucial for protecting sensitive data during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptography (Keyword: “Secrets”)

A

Mnemonic: “KEYS”

Keys - Emphasizes the use of cryptographic keys.

Encryption - The process of converting data into a secure format.

Yield - The resulting secure data that can only be accessed with a key.

Secure - The overall goal of cryptography to secure data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Symmetric encryption

A

Uses the same key for both encryption and decryption (fast but requires safe key distribution).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric encryption

A

Uses a pair of keys (public and private) where the public key encrypts and the private key decrypts (safer for distribution but slower).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Incident Response (Keyword: “RIDERS”)

Incident response is the organized approach to managing the aftermath of a security breach or attack.

A

Recognition - Identifying a security incident.

Investigation - Investigating how the breach happened.

Documentation - Keeping records of the incident and the response.

Eradication - Removing the threat from the system.

Recovery - Restoring and confirming system functionality.

Summary - Reviewing and learning from the incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does compliance with regulations like GDPR impact the day-to-day operations of a cybersecurity team

A

mnemonic “LAW”

Legal requirements could include laws like GDPR, HIPAA, or PCI-DSS, which dictate how organizations must protect data.

Audit refers to the regular reviews and checks that ensure compliance with these legal requirements.

Watchfulness means maintaining ongoing vigilance to adapt to new legal standards and compliance requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can you describe the differences between symmetric and asymmetric encryption and give an example of when each might be used

A

Symmetric encryption uses the same key for both encryption and decryption, which makes it faster and more efficient for processing large volumes of data. For example, AES (Advanced Encryption Standard) is widely used for encrypting files and database information due to its speed and security.

Asymmetric encryption, on the other hand, uses a pair of keys—one public and one private. The public key can be shared with anyone, while the private key is kept secret. This type of encryption is ideal for secure communications over insecure channels, such as the internet. A typical use case is the SSL/TLS protocol, which uses asymmetric encryption to establish a secure session over the web. It allows websites to secure sensitive user data during transmission, such as credit card information and login credentials.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does compliance with regulations like GDPR impact the day-to-day operations of a cybersecurity team

A

Compliance with GDPR significantly impacts daily operations in several ways. First, it requires that we implement data protection ‘by design and by default.’ This means that any new system or process we develop must consider privacy from the outset, requiring regular privacy impact assessments.

Additionally, GDPR mandates the rights of data subjects, such as access to their data and the right to be forgotten. Our team must have processes in place to quickly respond to such requests.

We also need to ensure that any data breaches are reported to regulatory authorities and affected individuals within 72 hours of discovery, which requires us to have robust detection and reporting mechanisms in place.

Finally, maintaining compliance involves continuous education and training for our team and regular audits to ensure all our practices and systems remain in compliance with the evolving landscape of privacy laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the main security measures you would recommend for a network that frequently transmits sensitive data over the Internet

A

For a network that transmits sensitive data, I recommend:

Encryption: Use strong encryption protocols like TLS for data in transit to protect against eavesdropping.

Firewalls and IDS/IPS: Deploy firewalls to control traffic and use intrusion detection and prevention systems to monitor for and respond to malicious activities.

VPN: Implement VPNs for secure remote access, ensuring that data remains encrypted even over public networks.

Regular Audits: Conduct security audits and vulnerability assessments regularly to identify and mitigate potential risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What steps would you take to secure a new IoT device being introduced into a corporate environment

A

“To secure a new IoT device, I would:

Segmentation: Place IoT devices on a separate network segment to limit access and reduce the risk of lateral movement in case of compromise.

Update Management: Ensure the device firmware and software are up-to-date to mitigate known vulnerabilities.

Strong Authentication: Enforce strong authentication mechanisms to control access to the device.

Continuous Monitoring: Implement continuous monitoring to detect unusual behavior indicative of a security breach.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What steps do you take in the risk management process, and how do you prioritize which risks to address first

A

Mnemonic: “RAMP”

Recognize: Identify risks through assessments.

Assess: Evaluate the likelihood and impact of risks.

Mitigate: Implement strategies to reduce or manage risks.

Periodically Review: Continuously monitor and update risk management strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Can you explain the importance of having robust security policies in place, and what elements should be included in an effective security policy.

Mnemonic: “SPUR”

A

Robust security policies are crucial as they provide clear guidelines and standards for managing and protecting organizational assets. Effective security policies should include:

Scope: Define what the policy covers.

Purpose: Clarify why the policy is necessary.

Users: Identify who is affected by the policy.

Rules: Establish clear rules and guidelines to follow.

17
Q

What steps would you take to secure a network from a ransomware attack?

A

First, I would ensure that all systems are regularly updated with the latest security patches to close vulnerabilities.Next, I’d implement robust endpoint protection that includes anti-malware and antivirus software capable of detecting and isolating ransomware threats.

I would also enforce strict access controls to limit the spread of ransomware if it breaches the initial defenses. This includes restricting user permissions based on roles.

Furthermore, I’d emphasize the importance of regular backups.

Finally, I would conduct ongoing security training for all employees, focusing on recognizing phishing attempts and other common entry points for ransomware, to prevent such threats from entering the network through human error.”

18
Q

Explain the importance of the CIA Triad in cybersecurity

A

Confidentiality ensures sensitive information is accessed only by authorized users.

Integrity maintains data accuracy and prevents unauthorized alterations. Techniques like cryptographic hash functions and digital signatures help maintain integrity.;

Availability keeps information accessible as needed,This involves protecting systems against attacks that can cause downtime, such as DDoS attacks, and implementing disaster recovery and business continuity plans to ensure that systems can quickly recover from interruptions.

19
Q

Describe a time when you had to implement a security measure to comply with data protection laws.

A

To comply with GDPR, I led efforts to enhance data encryption, refine access controls, and establish processes for managing data subject requests. We also improved transparency and documentation, updating privacy policies and training staff to ensure all practices aligned with the regulation.

20
Q
A