Network Security Flashcards
What is the abbreviation for information security?
InfoSec
What is the abbreviation for security operations?
SecOps
What is a person, device, information or locations that SecOps aims to protect from attack
Asset
What is an action taken by a threat that exploits a vulnerability?
Attack
What is the potential of a threat to exploit a vulnerability?
Risk
What is the abbreviation for IT security operations responsible for protecting assets by reducing the risk of attacks?
SecOps
What is something or someone that can exploit a vulnerability to attack an assett?
Threat
What is a weakness in software, hardware, facilities or humans that can be exploited by a threat?
Vulnerability
What is an indispensable tool for detecting vulnerabilities within servers, computers and network devices?
Vulnerability Scanner
You need to protect your assets from both what?
Physical and electronic security matters
Blank that aren’t changed in network devices are easy to find online for an attacker
Default passwords
What unleashes a multitude of viruses or malware or ransomware into a network from one seemingly innocuous computer?
Trojan Horse
What is a virus laying in wait for some preordained time or a trigger to release its attack?
Advanced Persistent Threat (APT)
What is the real danger of an APT attack?
Backups are infected
What is the term for an exploit or vulnerability that is not yet known to the public, so there is no patch available to mitigate it.
Zero Day Exploits
Who allows administrators to forward unknown or suspicious code patterns for analysis?
Intrusion Prevention System (IPS) vendors
Who is tasked with attempting to compromise a network’s security?
Penetration tester
Who is responsible for scanning servers and network devices for known vulnerabilities?
Vulnerability tester
What is nessus.com
Vulnerability scanning tool
Which team attempts to compromise the security?
Red team
Which team attempts to defend a network’s security?
Blue team
Which team is the continuous improvement team that debrief and cross-train each other after an attack?
Purple team
Who are IT professionals who specialize in penetrating or compromising network security but only to help improve its own security posture?
White hat hackers
Who possess the knowledge and will to breach systems for profit?
Black hat hackers
Who have no permission to attack a network, but they have no malicious intent?
Grey hat hackers
What is the key to preventing insider threats?
Minimum set of permissions
What is the term for intellectual property theft by nation states with large budgets?
Industrial espionage
Who are copycat criminals of the hacker world who hack out of curiosity with a lack of knowledge?
Script Kiddies
What is the term for someone or something that can exploit a vulnerability to attack an asset?
Threat
Which attack comes from the historical technique that allows the attacker to eavesdrop a conversation between two humans or two computers?
Wiretapping
What is a device called that listens and records traffic on the network?
Packet sniffer
What are fiber optic cables immune to attack-wise?
EMF listening devices
What is the term for an application that can systematically check each port by sending thousands of TCP/IP packets to the victim’s computer?
Port scanner
What is a popular target of attacks because they typically contain high-value information?
Database servers
When the attacker knows what ports are accepting traffic, they can run what against the victim’s computer to see if any of the services can be easily exploited?
Vulnerability scanner
What type of attack allows an attacker to take control of a database server by inserting special commands into input boxes instead of entering basic text?
SQL injection