Network and Security Flashcards

1
Q

These are physical media that connect devices within a network

A

Cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

These are devices that connect multiple devices on a network.

A

Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These are devices that connect multiple networks together.

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These devices create a wireless local area network, or WLAN, usually in an office or large building.

A

Wireless Access Points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A suite of communication protocols used to interconnect network devices on the internet; the basic communication language or protocol of the internet

A

TCP/IP (Transmission Control Protocol/Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is the lowest layer of the TCP/IP model, which corresponds to the combination of the Physical and Data Link layers of the OSI model. It handles the transmission of data between devices on the same network.

A

Network Interface Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This layer is equivalent to the Network layer of the OSI model. It’s responsible for the transmission of data across networks, and it defines the IP addressing scheme.

A

Internet Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This layer is equivalent to the Transport layer of the OSI model. It provides communication session management between host computers. The protocols used here are TCP and UDP.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is the highest layer in the TCP/IP model, corresponding to the Session, Presentation, and Application layers of the OSI model. It includes protocols like HTTP, SMTP, FTP, etc.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A conceptual framework that standardizes the functions of a communication system into seven categories

A

Open Systems Interconnection (OSI) Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is the lowest layer of the OSI model. It represents the physical devices and media that carry the data.

A

Physical Layer (Layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This layer provides node-to-node data transfer—a link between two directly connected nodes.

A

Data Link Layer (Layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This layer is responsible for packet forwarding, including routing through different networks.

A

Network Layer (Layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This layer provides transparent transfer of data between end users, thus providing reliable data transfer.

A

Transport Layer (Layer 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This layer manages communication sessions, i.e., it controls the dialogues/connections between computers.

A

Session Layer (Layer 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This layer translates data for the application layer based on the syntax or semantics that the application accepts

A

Presentation Layer (Layer 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This is the topmost layer that directly interacts with the software applications.

A

Application Layer (Layer 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This command is used to test the reachability of a host on an IP network and to measure the round-trip time for packets sent from the local host to a destination computer.

A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This command is used to track in real-time the pathway taken by a packet on an IP network from source to destination, reporting the IP addresses of all the routers it passed along the way.

A

Traceroute (tracert on Windows)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

These commands are used to display or set the network configuration of a system. They can provide information like IP address, subnet mask, default gateway, etc.

A

Ipconfig (Windows) / ifconfig (Linux)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This command displays active network connections and listening ports, helping to identify unwanted connections or services that might be running.

A

Netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This command is used to obtain domain name or IP address mapping by querying the DNS (Domain Name System).

A

Nslookup

23
Q

This command displays and modifies the IP-to-Physical address translation tables used by the Address Resolution Protocol.

A

ARP

24
Q

This refers to computing environments that simulate the hardware of a physical computer.

A

Virtual Computing

25
Q

Multiple VMs can run on a single physical machine, making more efficient use of hardware resources

A

Efficiency

26
Q

VMs are isolated from each other, increasing security. If one VM crashes or is compromised, it doesn’t affect the others

A

Isolation

27
Q

VMs can be created, deleted, and moved between physical machines as needed

A

Flexibility

28
Q

This is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.

A

Cloud Computing

29
Q

This includes basic storage and computing capabilities as standardized services over the network.

A

Infrastructure as a Service (IaaS)

30
Q

This includes sets of services and workflows that specifically target developers, who can use shared tools, processes, and APIs to accelerate the development, testing, and deployment of applications.

A

Platform as a Service (PaaS)

31
Q

In this service model, the cloud-based applications are provided to the user, as a service on demand. It is a single instance of the service running on the cloud and multiple end users are serviced.

A

Software as a Service (SaaS)

32
Q

Resources used exclusively by a single business or organization

A

Private cloud

33
Q

Services provided over the public internet and available to anyone

A

Public cloud

34
Q

A combination of public and private clouds

A

Hybrid cloud

35
Q

A type of cable that has an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield. It was widely used for early computer networks as it can support greater cable lengths between network devices than twisted pair cable.

A

Coaxial Cable

36
Q

This type of cable is widely used in most modern Ethernet networks. It consists of four pairs of thin wires, each pair is twisted to minimize interference from other devices and reduce error rates.

A

Twisted Pair Cable

37
Q

The most common type due to its cost-effectiveness and ease of use. The wires in each pair are twisted around each other to reduce electromagnetic interference. Categories include: Cat3, Cat5, Cat5e, Cat6, Cat6a, Cat7, and Cat8, with each subsequent category offering improved performance.

A

Unshielded Twisted Pair (UTP):

38
Q

Has a metal shield around each pair of wires. The shielding helps to block electromagnetic interference, allowing for greater transmission distances and higher data rates.

A

Shielded Twisted Pair (STP)

39
Q

This type of cable contains one or more optical fibers, which are used to carry light. These are capable of carrying a high bandwidth at high speeds over long distances, and it is not subject to electromagnetic interference like copper cables. They are commonly used for backbone networks, long-distance transmission, and noisy areas.

A

Fiber Optic Cable

40
Q

Supports speeds up to 1 Gbps (Gigabit per second).
Maximum length of 100 meters.

A

Cat5e (Category 5 Enhanced)

41
Q

Supports speeds up to 1 Gbps for a maximum length of 100 meters; can support 10 Gbps for a shorter distance (up to 55 meters).
Better performance than Cat5e, with less crosstalk and system noise.

A

Cat6 (Category 6)

42
Q

Supports speeds up to 10 Gbps.
Maximum length of 100 meters.
Improved version of Cat6, designed to double the bandwidth and reduce noise and interference.

A

Cat6a (Category 6 Augmented)

43
Q

An action that exploits a vulnerability to compromise the security of a system. Can be active, such as attempts to alter system resources or data, or passive, such as data eavesdropping

A

Attacks

44
Q

An action that exploits a vulnerability to compromise the security of a system. Can be active, such as attempts to alter system resources or data, or passive, such as data eavesdropping

A

Threats

45
Q

Refers to the potential for loss or damage when a threat exploits a vulnerability. It’s typically expressed as the likelihood of a threat source exploiting a vulnerability and the resulting impact on the organization.

A

Risks

46
Q

A weakness or gap in a security program that can be exploited by threats to gain unauthorized access to an asset. Vulnerabilities can be physical (like a server room’s door left unlocked), digital (like an unpatched software), or even human (like an employee being susceptible to social engineering attacks).

A

Vulnerabilities

47
Q

This is the assurance that sensitive information is accessed only by an authorized person and kept safe from others

A

Vulnerabilities

48
Q

This is the assurance that the information is trustworthy and accurate. It aims to prevent unauthorized changes to data—whether it’s in transit or storage—and ensure that changes are traceable (non-repudiation). Methods to ensure include file permissions and user access controls, version control, checksums, and cryptographic hashes.

A

Integrity

49
Q

This is the assurance that information and resources are accessible to authorized users when needed. Often ensured via redundancy, failover, RAID, backups, etc.

A

Availability

50
Q

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules

A

Firewalls

51
Q

A device or software application that monitors a network or systems for malicious activity or policy violations

A

Intrusion Detection System (IDS)

52
Q

Capable of not only detecting malicious activity but also preventing or blocking it

A

Intrusion Prevention Systems (IPS)

53
Q

The same key is used to encrypt and decrypt data. It’s fast and efficient, but the key must be securely shared between the sender and receiver.

A

Symmetric encryption

54
Q

Also known as public key encryption, it uses a pair of keys: a public key to encrypt data, and a private key to decrypt data

A

Asymmetric encryption