Network Security Flashcards

1
Q

What is the abbreviation for information security?

A

InfoSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the abbreviation for security operations?

A

SecOps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a person, device, information or locations that SecOps aims to protect from attack

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an action taken by a threat that exploits a vulnerability?

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the potential of a threat to exploit a vulnerability?

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the abbreviation for IT security operations responsible for protecting assets by reducing the risk of attacks?

A

SecOps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is something or someone that can exploit a vulnerability to attack an assett?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a weakness in software, hardware, facilities or humans that can be exploited by a threat?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an indispensable tool for detecting vulnerabilities within servers, computers and network devices?

A

Vulnerability Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You need to protect your assets from both what?

A

Physical and electronic security matters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blank that aren’t changed in network devices are easy to find online for an attacker

A

Default passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What unleashes a multitude of viruses or malware or ransomware into a network from one seemingly innocuous computer?

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a virus laying in wait for some preordained time or a trigger to release its attack?

A

Advanced Persistent Threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the real danger of an APT attack?

A

Backups are infected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the term for an exploit or vulnerability that is not yet known to the public, so there is no patch available to mitigate it.

A

Zero Day Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who allows administrators to forward unknown or suspicious code patterns for analysis?

A

Intrusion Prevention System (IPS) vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who is tasked with attempting to compromise a network’s security?

A

Penetration tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who is responsible for scanning servers and network devices for known vulnerabilities?

A

Vulnerability tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is nessus.com

A

Vulnerability scanning tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which team attempts to compromise the security?

A

Red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which team attempts to defend a network’s security?

A

Blue team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which team is the continuous improvement team that debrief and cross-train each other after an attack?

A

Purple team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Who are IT professionals who specialize in penetrating or compromising network security but only to help improve its own security posture?

A

White hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Who possess the knowledge and will to breach systems for profit?

A

Black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Who have no permission to attack a network, but they have no malicious intent?
Grey hat hackers
26
What is the key to preventing insider threats?
Minimum set of permissions
27
What is the term for intellectual property theft by nation states with large budgets?
Industrial espionage
28
Who are copycat criminals of the hacker world who hack out of curiosity with a lack of knowledge?
Script Kiddies
29
What is the term for someone or something that can exploit a vulnerability to attack an asset?
Threat
30
Which attack comes from the historical technique that allows the attacker to eavesdrop a conversation between two humans or two computers?
Wiretapping
31
What is a device called that listens and records traffic on the network?
Packet sniffer
32
What are fiber optic cables immune to attack-wise?
EMF listening devices
33
What is the term for an application that can systematically check each port by sending thousands of TCP/IP packets to the victim's computer?
Port scanner
34
What is a popular target of attacks because they typically contain high-value information?
Database servers
35
When the attacker knows what ports are accepting traffic, they can run what against the victim's computer to see if any of the services can be easily exploited?
Vulnerability scanner
36
What type of attack allows an attacker to take control of a database server by inserting special commands into input boxes instead of entering basic text?
SQL injection
37
What type of attack is made possible by applications that do not properly validate user input for extraneous content. The attacker purposefully enters text that is too large to fit within a region of memory
Buffer overflow
38
Reviewing your source code and enabling the NX-bit (no execute functionality on the computer are two ways to prevent what type of attack?
Take control attack
39
What attack is made more difficult by advances in networking, like the Ethernet switch?
Spoofing
40
What is the term for an attacker impersonating the sender and receiver of network traffic?
Spoofing the identinty
41
Which attack wants to intercept the communication between a client computer and a server?
Man in the middle attack
42
What attack is used to cause an Ethernet switch to flood all traffic to every port of the switch?
ARP poisoning
43
What is the term for an attack that overwhelms a victim's computer wit enormous amounts of useless traffic?
Denial of Service (DOS) attack
44
What attack would send the victim malformed ICMP packet that would cause it to crash?
Ping of death
45
What attack overwhelms a victim's computer with an immense volume of ICMP packets all containing a forged, randomized service address?
Ping flood
46
Which attack is a distributed DoS attack in which the attacker sends an ICMP echo request to a large IP subnet specifying the victim's address as the source address?
Smurf attack
47
What attack causes the victim's computer to consume excessive CPU time as is constantly sets up and tears down thousands of encrypted sessions over and over again?
SSL attack
48
What is the act of manipulating human users to gain access or information?
Hacking a human
49
What is the act of pretending to be an employee or vendor in order to gain access to the network?
Impersonating
50
What is the social engineering attack that gets information voluntarily from the victim through email or phone?
Phishing
51
What is the term for a server or device that is configured to appear to have legitimate data?
Honey pot
52
Honeypot is also known as what?
tar pit
53
The goal of what is to provide a false positive for the attacker and make them believe the fake data is real.
Honey pot
54
What can contain tracking information that can be obtained by the intrusion detection system in order to collect data on the attacker?
Tar pit server
55
The best way to secure the network is use what in a what manner?
Multiple tools; overlapping
56
What does IPS stand for?
Intrusion Prevention System
57
Minimize exposure to attack by keeping your what up to date
patches
58
What guides help you remove unnecessary services & features that may be susceptible to attack?
Security-hardening
59
You should test and develop what before a virus attack occurs?
Containment plans
60
Run blank on your system regularly and keep the virus definition up-to-date as possible to help you detect new and emerging threats
antivirus and anti-malware scans
61
What does CIA stand for?
Confidentiality, Integrity, Availability
62
What in the CIA triad limits access?
Confidentiality
63
What in the CIA triad enables you to trust the information?
Integrity
64
What in the CIA triad ensures you have access to the information?
Availability
65
Blank is critical in security management. Some orgs create specific classifications for their data that define different sensitivity levels, each with specific policies
Consistency
66
The goal of what in the CIA triad is to prevent an unauthorized user from accessing, copying, or transmitting the information
Confidentiality
67
Confidentiality is often equated to what?
Privacy
68
What ensures that only the intended recipient of the information can access it, following a need-to-know policy and destroying all copies that are no longer needed.
Privacy
69
Blank information is easy to steal and change
Unencrypted
70
Blank files are rarely purged from a disk immediately and often can be recovered with ease
Deleted
71
Blank of a device gives an attacker unlimited time to break an encryption
Physical theft
72
Blank is a method to gain a victim's trust to provide information
Social Engineering
73
Blank is like storing files in the wrong location
Accidents & Malfunctions
74
Encrypt the blank (where it is stored) and blank (where it is moving across the network)
Information-at-rest Information-in-transit
75
What describes data where it is stored?
At-rest
76
What describes data moving across the network?
In-transit
77
Blank makes it possible to identify where information came from and if the data has changed since it was originally sent
Integrity
78
Blank works well with confidentiality
Integrity
79
Blank attacks can compromise integrity
Man-in-the-middle attacks
80
Intentional or unintentional blank can or modifications can compromise integrity
Deletion
81
Blank in equipment can cause data corruption
Malfunction
82
Blank such as an EMP attack can destroy or severely corrupt data
Natural phenomena
83
You should require all data transmissions to use blank or blank to confirm identity
Encryption; data signatures
84
Blank, such as SHA-3, can be used to verify that the data has not changed
One-way hash calculations
85
Blank create a value that can be used to verify the data has not changed
SHA-3
86
Use blank with your data storage to quickly revert accidental changes or deletions
Version control
87
You can blank to server solutions by carefully managing your app updates and patches
High availability
88
Blank attacks prevent legitimate users from accessing resources
DoS and distributed DoS
89
Accidental changes to blank can remove access for authorized users
Access control lists
90
You should create and maintain a blank that includes a full site failover as well as the method to restore data for individual servers
Full disaster recovery plan
91
You should implement server what, using clustering tech where appropriate
High availability
92
Setting up blank and storing a backup copy at another physical location protect against site-level disasters
regular backups