Network Security Flashcards

1
Q

What is CIA Triad?

A
  • Confidentality, Integrity, and Availability
  • A model that combines three principles of information security to help organizations protect their sensitive systems and information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Confidentality?

A
  • Keeping data private and safe
  • Symmetrical Encryption & Asymmetrical Encryption
  • Steganography
  • Access Control Methods
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Symmetrical Encryption?

A
  • Sender and Recipient use same keys
  • Data Encryption Standard (DES) - Weak
  • Triple DES
  • Advanced Encryption Standard (AES) - WPA2 in 128, 192, 256 bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Asymmetrical Encryption?

A
  • Sender and Recipient use different keys
  • RSA algorithm
  • Common use with Public Key Infrastructure
  • Can be in secure emails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Integrity?

A
  • Ensure data has not bee modified in transit
  • Hashing Algorithms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Availability?

A
  • Ensures data accessibility
  • Redundancy
  • Fault Tolerance
  • Load Balancing
  • Patch Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Confidentiality Attack?

A

Attempt to make data viewable by attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Integrity Attack?

A

Attempt to alter data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Availability Attack?

A

Attempt to limit network accessibility and usability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is TACACS+?

A
  • Terminal Access Controller Access Control System Plus (TACACS+) under TCP
  • Perform the role of an authenticator in an 802.1x network
  • Encrypts the entire payload of the access-request packet
  • Primarily used for device administration
  • Separates authentication and authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is RADIUS?

A
  • Remote Authentication Dial-In User Service (RADIUS) under UDP
  • Provides centralized administration of dial-up, VPN, and wireless network authentication
  • Encrypts only the password in the access-request packet
  • Combines authentication and authorization (802.1x)
  • Primarily used for network access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is NAC?

A
  • Network Access Control (NAC)
  • A concept of effective security posture employing multiple tools and different techniques to slow down an attacker
  • Time-based, Location-based, Role-based, Rule-based.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is CVE?

A
  • Common Vulnerabilities and Exposures (CVE)
  • List of publicly disclosed vulnerabilities – known vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Zero Day?

A
  • Newly discovered vulnerabilities - A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is DLP?

A
  • Data Loss Policy
  • A document defining how organizations can share and protect data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is DMZ?

A
  • Demilitarized Zone
  • A lightly protected subnet (previously known as a DMZ) consisting of publicly available servers placed on the outside of the company’s firewall
17
Q

What is Honeypot/Honeynet?

A

Attracts and traps potential attackers to counteract any attempts at unauthorized access to a network

18
Q

What is Kerberos?

A
  • Windows domain authentication/authorization
  • Provides secure authentication over an insecure network
  • “Ticket”
19
Q

In the Kerberos-based authentication process, the purpose of the client’s timestamp is to provide countermeasure against?

A

Replay Attacks

20
Q

What protocol ensures the reliability of the Kerberos authentication process?

A

NTP

21
Q

What is SIEM?

A
  • Security Information and Event Management
  • A security solution designed to detect anomalies in the log and event data collected from multiple network devices
22
Q

What is Penetration Testing?

A
  • Bypasses security controls
  • Actively tests security controls
  • Exploits vulnerabilities
23
Q

What is Vulnerability Scanning?

A
  • Identifies lack of security controls
  • Identifies common misconfigurations
  • Passively tests security controls
24
Q

What is ACL?

A
  • Access Control List
  • A mechanism in several network devices used to restrict access based on the following:
  • Source & Destination MAC address
  • Source & Destination IP address
  • Port numbers or services
  • Time of day
25
Q

What is PKI?

A
  • Public Key Infrastructure (PKI)
  • A complex authentication technique that functions using digital certificates
26
Q

What is IDS?

A
  • Intrusion Detection Systems (IDS) - NIDS
  • Detect unauthorized access or anomalies.
  • System administrators need to review report and plan an action against threats
27
Q

What is IPS?

A
  • Intrusion Prevention Systems (IPS) - NIPS
  • Detect and take action to prevent intrusion
  • Between Firewall and Router
28
Q

What is a Threat?

A
  • Person or event that has the potential to negatively impact valuable resources
  • Ex: Hackers & Hurriances
29
Q

What is a Vulnerability?

A
  • Weakness in system design, implementation, or lack of preventive mechanisms
  • Usually within user control
30
Q

What is a Risk?

A

Occurs when a threat exploits a vulnerability

31
Q

What is SAML?

A
  • Security Assertion Markup Language (SAML)
  • Designed for exchanging authentication and authorization data between trusted parties, enabling SSO and secure access to multiple systems.
32
Q

What is a CVSS?

A
  • Common Vulnerability Scoring System
  • Provides a score from 0 to 10 indicating severity of a vulnerability.
33
Q

What is the primary focus of Secure Access Service Edge (SASE)?

A

Securing network access for remote users and branch offices.

34
Q

What is AAA?

A
  • Authentication, Accounting, Authorization
  • Primary method for access control often uses RADIUS, TACAS, or Kerberos