Network Security Flashcards

1
Q

Confidentiality

A

Keeping the data private and safe, only people who should access data, can
Encryption
Authentication to access resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Encryption
examples
cons

A
sender and receiver share the same key
DES - weak, snmpv3
3DES
AES - strong, WPA2
cons: key management, poor scalability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric Encryption
example
cons

A

Uses different keys for sender and receiver
RSA: most popular, uses public key infrastructure PKI
used for online shopping (HTTPS)
slower than symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

Ensures data has not been modified in transit
Verifies the source that traffic originates from
uses hashing
ex: MD5, SHA1, SHA256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

Measures accessibility of the data

Increased by designing redundant networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat

A

A person or event that has the potential for impacting a valuable
resource in a negative manner
external: outside org
internal: inside org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Technical Vulnerabilities

A

System-specific conditions that create security weaknesses
Common Vulnerabilities and Exposures: CVE (Known vulnerabilities)
Zero-Day Vulnerability (Brand new vulnerability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exploit

A

Piece of software code that takes advantage of a security flaw or
vulnerability within a system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Risk Assessment

A
Used to identify, assess, and implement key security controls within an
application, system, or network
-threat
-vulnerability
-penetration
-posture
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat Assessment

A

Focused on the identification of the different threats that may wish to
attack or cause harm to your systems or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerability Assessment

A

Focused on identifying, quantifying, and prioritizing the risks and
vulnerabilities in a system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Penetration Test

A

Evaluates the security of an IT infrastructure by safely trying to exploit
vulnerabilities within the systems or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Posture Assessment

A

Assesses cyber risk posture and exposure to threats caused by
misconfigurations and patching delays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Business Risk Assessment

A

Used to identify, understand, and evaluate potential hazards in the
workplace
-process
-vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Process Assessment

A

The disciplined examination of the processes used by the organization
against a set of criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vendor Assessment

A

The assessment of a prospective vendor to determine if they can
effectively meet the obligations and the needs of the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Least Privilege

A

Using the lowest level of permissions or privileges needed in order to
complete a job function or admin task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(RBAC)

A

Role-Based Access Control
An access model that focuses on a group of
permissions versus an individual’s permissions

Mandatory Access Control: system decides, military classification
Discretionary Access Control: resource owner decides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Zero-Trust

A

A security framework that requires users to be authenticated and
authorized before being granted access to applications and data

20
Q

Defense in Depth

A

Cybersecurity approach in which a series of
defensive mechanisms are layered in order to protect valuable data and
information
Physical, logic, administrative

21
Q

Screen Subnet the artist formally known as dmz

A

Subnet in the network architecture that uses a single firewall with three
interfaces to connect three dissimilar networks
Triple-homed firewall (internet, dmz, intranet)

22
Q

Separation of Duties

A

Prevent frauds and abuse by distributing various tasks and approval
authorities across a number of different users

23
Q

(NAC)

A

Network Access Control
Ensures a device is scanned to determine its current state of security prior to
being allowed network access
IEEE 802.1x - Used in port-based Network Access Control

24
Q

Honeypot/ Honeynet

A

Attracts and traps potential attackers to counteract any attempts at
unauthorized access to a network
Track habits of attackers

25
Q

Multifactor Authentication

A

Authenticates or proves an identity using more than one method
Something you know (username, pins, passwords)
Something you have (cards, RFID tags, RSA key fob)
Something you are (fingerprint, retina)
Something you do (signature, voice)
Somewhere you are (geotagging/fencing)

26
Q

Dictionary Attack

A

Guesses the password by attempting to check every single word or
phrase contained within a word list, called a dictionary

27
Q

Brute Force Attack

A

Tries every possible combination until they figure out the password
good security - min 12 characters

28
Q

Hybrid Attack

A

Combination of dictionary and brute force attacks

29
Q

(LDAP)

A
Lightweight Directory Access Protocol
Validates a username and password combination against an LDAP server
as a form of authentication
Port 389 LDAP
Port 636 LDAP Secure
30
Q

Local Authentication

A

Process of determining whether someone or something is who or what it
local user login on pc

31
Q

Kerberos

A

Focused on authentication and authorization within a Windows domain
environment
Provides secure authentication over an insecure network

32
Q

(RADIUS)

A

Remote Authentication Dial-In User Service
Network Access Protocol
Provides centralized administration of dial-up, VPN, and wireless network
authentication, authorization, accounting
udp

33
Q

(NAC)

A

Network Access Control
Ensures a device is scanned to determine its current state of security prior to
being allowed network access
IEEE 802.1x - Used in port-based Network Access Control

34
Q

(TACACS+)

A

Terminal Access Controller Access Control System Plus
Network Access Protocol
Used to perform the role of an authenticator in an 802.1x network
tcp
Ensure Port 49 is open
Excellent if using Cisco devices

35
Q

802.1x

A

A standardized framework that’s used for port-based authentication on
both wired and wireless networks

36
Q

(EAP)

A

Extensible Authentication Protocol

Allows for numerous different mechanisms of authentication

37
Q

Indoor and Outdoor cameras

A

Indoor cameras tend to be lighter, cheaper, and easier to install

38
Q

Infrared System

A

Displays images based on the amount of heat in a room
Quickly and easily identify where a person is inside the room
Identify hot spots in the room and detect gear that could
overheat before it actually does

39
Q

Ultrasonic Camera

A

A type of surveillance camera that uses sound-based detection

40
Q

Asset Tag

A

Identifies a piece of equipment using a unique serial number,
code, or barcode
Reduce theft and helps to identify the device

41
Q

Tamper Detection

A

Ensures a network equipment has not been modified once labeled
and stored

42
Q

Access Control Vestibule (Mantrap)

A

An area between two doorways that holds people until they are
identified and authenticated

43
Q

Smart Locker

A

A fully integrated system that allows you to keep your laptop, tablet,
smartphone, or other valuables inside

44
Q

Asset Disposal

A

Occurs whenever a system is no longer needed by an organization
Perform a factory reset
Wipe the configuration
Sanitize the devices

45
Q

Factory Reset

A

Removes all customer specific data that has been added to a network
device since the time it was shipped from the manufacturer

46
Q

Data Remnants

A

Leftover pieces of data that may exist in the hard drive which we no
longer need

47
Q

Physical Environment

A

Computing equipment can be damaged by influencing the physical
environment
Temperature - Attacker disturbs the HVAC to overheat your systems
Humidity - Create a high level of moisture/humidity
Gas - Inject gas into an environment that could ignite