Network Security Flashcards

1
Q

What is network segmentation and why is it important?

A

Dividing a network into smaller subnets to control access, improve security, and reduce attack surfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are chokepoints in network security?

A

Points where network traffic is funneled for monitoring, filtering, and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some examples of network chokepoints?

A

Routers – Directs network traffic.
Firewalls – Blocks or allows traffic.
Proxy Servers – Intercepts and filters traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a firewall?

A

A security system that monitors and controls network traffic based on predefined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where should a firewall be placed?

A

At network boundaries where trust levels change (e.g., between a corporate network and the internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is packet filtering in firewalls?

A

The oldest and simplest method that inspects each packet’s source/destination IP, port, and protocol to allow or block traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is stateful packet inspection (SPI)?

A

Tracks the state of connections (source/destination, session info).
Maintains a state table to monitor ongoing connections.
More secure than packet filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is deep packet inspection (DPI)?

A

Analyzes the actual content of packets (not just headers).
Can detect malware, unauthorized data transfers, or policy violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do proxy servers enhance security?

A

Intercepts and filters traffic before it reaches users.
Masks internal IP addresses from the internet.
Can log and analyze network activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a DMZ in network security?

A

A buffer zone between an internal network and the public internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why use a DMZ?

A

Protects public-facing servers (e.g., web, email, DNS).
Prevents direct access to internal systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Intrusion Detection System (IDS)?

A

A security tool that monitors network traffic for suspicious activity or known attack patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is signature-based IDS?

A

Works like antivirus software.
Detects attacks using predefined signatures of known threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is anomaly-based IDS?

A

Uses machine learning or behavior analysis to detect unusual traffic patterns.
More effective for detecting new threats but can generate false alarms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a VPN (Virtual Private Network)?

A

An encrypted tunnel between two endpoints that secures data over untrusted networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a VPN concentrator?

A

A hardware device that manages multiple VPN connections.

17
Q

What is a rogue access point?

A

An unauthorized Wi-Fi access point that can allow attackers to intercept traffic.

18
Q

What tool is used to scan for unauthorized access points?

A

Kismet – Detects rogue APs and network devices.

19
Q

What are the main Wi-Fi encryption standards, ranked from weakest to strongest?

A

WEP (Wired Equivalent Privacy) – Weak, easily cracked.
WPA (Wi-Fi Protected Access) – More secure but still vulnerable.
WPA2 – Uses AES encryption; strong security.
WPA3 – Latest standard, stronger encryption & defenses against brute force attacks.

20
Q

What are some insecure legacy network protocols?

A

FTP (File Transfer Protocol) – Transfers files unencrypted.
Telnet – Allows remote access without encryption.
POP (Post Office Protocol) – Transfers email unencrypted.

21
Q

What are the secure alternatives to legacy protocols?

A

SSH (Secure Shell) – Replaces Telnet for secure remote access.
SFTP (Secure File Transfer Protocol) – Secure version of FTP.
IMAP with SSL/TLS – Secure alternative to POP for email.

22
Q

What are CoWPAtty and Aircrack-NG used for?

A

Cracking WEP, WPA, WPA2 Wi-Fi passwords.

23
Q

What is a network scanner?

A

A tool that interrogates devices and networks for information.

24
Q

What is Nmap (Network Mapper)?

A

A powerful port scanner used to identify open ports, services, and devices on a network.

25
Q

What is the purpose of vulnerability scanners?

A

They scan networks and systems for known security flaws.

26
Q

What is a packet sniffer?

A

A tool that captures and analyzes network traffic.

27
Q

What are two common packet sniffing tools?

A

tcpdump – Command-line packet analyzer.
Wireshark – GUI-based traffic analysis tool.

28
Q

What is Kismet used for?

A

Wireless packet sniffing and detecting rogue access points.

29
Q

What is a honeypot?

A

A decoy system designed to lure hackers and analyze their attack methods.

30
Q

What is a honeynet?

A

A network of multiple honeypots used for advanced attack detection.

31
Q

What is the purpose of firewall mapping tools?

A

To identify firewall rules, topology, and weaknesses.