Network Security Focused Improvement Flashcards

1
Q

A ……..? is a device necessary for sending and receiving data. ……? allow computers to transport digital information over analog lines, such as phone or cable lines. Types of …..? include; cable …..?, DSL ……?, and satellite …..?.

(Just one word)

A

Modems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ……? is a point of connection between two or more networks that forwards data packets between networks. To have internet in your home, you need an internet …..? that connects the networks on the internet to the network of your home.
You can access the internet’s network either through a wired Ethernet port of via Wi-Fi.

(One word)

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ….? is used to connect devices in a specific network and allows them to communicate efficiently within the network. A ….? is a more complex version of a hub, in that ….? have the capability to add security measures and function far more intelligently, sending traffic directly from the sender to the receiver without the other devices being aware of the communication.

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ….? is similar to a router in that it connects two or more networks. The difference is that the router analyzes data packets to determine where to send the packet next, whereas a …..? simply forwards the data to the next network without analysis.

(One word)

A

bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ….? is a device that strengthens, replicates, regenerates signals that are weakened during transmission (for example because of distance)

A

Repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A range extender is a from of ….? that takes a distroted wifi signal and transmits it to the formally Dead Zone.

Dead Zone = Area without wifi/internet

(One word)

A

Repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A …? connects the router to the network, takes the data packets from the router, and sends them to all the devices in the network. Example is a USB …?

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Also, the network cable in a ….? topology is a shared communications medium, meaning that all computers attached to the network will receive any and all traffic sent on the network.

What kind of Topology?

A

Bus topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which topology is known as the Hub-and-Spoke topology?

A

Star topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The topology may be either a …..?, where every node has access to all other nodes, or a ….? network, where each node is only able to connect to a subset of the other nodes.

(Two terms)

A

Full mesh

Partial mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unlike other topologies such as bus, ring, or star, ….? topologies are not necessarily constructed using physical network cables. The nodes may connect using Wi-Fi or radio signals or by virtual links such as virtual private networks (VPNs).

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Commands

Internet control message protocol ICMP, it typically related to what network command?

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Commands

….? is one of the most basic tools for testing connectivity to other hosts. It sends an internet control message protocol (ICMP) echo request to a host and listens for the reply. If a reply is received, it will display the time it took and the time to live (TTL) left.

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network Commands

……? & …..? allow a user to manage accounts and devices remotely. The main difference between the two is that ….? is encrypted, and thus all data is secure from eavesdropping, while … is unencrypted.

A

telnet & SSH (secure shell)

SSH secure shell is encrypted

Telnet is unencrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

……? displays TCP/IP packets and other network packets that are being transmitted over the network system. It is a form of protocol analyzer (sometimes called a sniffer)

A

tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Commands

It is commonly used to determine what is deployed on a network for vulnerability analysis, security scans, and related activities.

What command is this?

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Network Commands

……..? scans networks to see what it can find in terms of hosts and open ports (including well-known ones for many applications).

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

…..? displays information about a user or users on a remote system, including things such as last log-in time and username. It is primarily used in Linux.

A

Finger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network Commands

…..? transfers a file from either a client to a server or from a server to a client using UDP (user datagram protocol) instead of TCP, and so it is usually used on reliable (local) networks.

A

TFTP (trivial file transfer protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network Commands

………? are used to trace the route an IP packet takes to a destination.

A

Traceroute and tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Network Commands

It can be useful in determining where a ping fails, troubleshooting performance issues, and other aspects regarding connectivity.

Which network command is this?

A

Traceroute and tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Network Commands

……….? is similar to traceroute or tracert in that it displays the path taken by a packet from its source to its destination.…….? is useful because it can be used by any user instead of needing superuser privileges. It is primarily used in Linux.

(One word)

A

Tracepath

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Network Commands

…..? provides the user with the IP, subnet mask, and default gateway for each network adapter by default with the /all option information, such as MAC address, DHCP status, and lease information.

Which network command is this?

A

Ipconfig (internet protocol configuration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Network Commands

Similar to ipconfig, ……? is used to configure the kernel network interfaces. It is implemented at the time of booting to configure the necessary interfaces.

A

ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Network Commands

Once the interfaces are configured, it is used for debugging or tuning the system. It is primarily used in Linux.

A

ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

……? displays the IP to physical (MAC) address mappings for hosts that have been discovered in the …. cache.

A

ARP (Address Resolution Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Network Commands

……? displays information about active ports and their state and can be useful in troubleshooting and capacity

A

Netstat (network statistics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

…..? displays information for displaying DNS information and troubleshooting DNS problems. It is useful in displaying names to IP address mappings.

A

Nslookup (name server lookup)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

……? is a command used to query the DNS name servers. It is helpful in troubleshooting DNS problems. It is also used for lookups and will display answers from the query. It is a replacement for nslookup.

A

Dig (domain information groper)

30
Q

What us a replacement to nslookup?

A

dig

31
Q

……? is a tool most often used to look up who owns a domain or block of IP addresses on the internet, including name, email address, and physical address.

A

Whois

32
Q

…? can be used to display the current route tables on a host. ….? can also be used to add or remove routes.

A

Route

33
Q

0.0.0.0 means the …….?, where the router sends things if it is not otherwise defined in the routing table

A

default gateway

34
Q

……..? command is used to securely copy files between servers, leveraging SSH (secure shell) for authentication and encryption.

A

SCP (Secure Copy Protocol)

35
Q

…… copies the file from one host to another host. The data is unencrypted. If encryption is needed, FTPS uses SSL/TLS (Secure Sockets Layer, replaced by Transport Layer Security; the same encryption used in https).

A

FTP (file transfer protocol)

36
Q

What does the address resolution protocol (ARP) cache map?

IP addresses to network destinations

IP addresses to MAC addresses

MAC addresses to interfaces

MAC addresses to ICMP

A

IP addresses to MAC addresses

37
Q

To combat these problems you need to take an ….? defense approach to network security. That means you will use multiple tools and methods together in an overlapping manner to create rings or layers of security.

A

in-depth

38
Q

Virus Response

The response plan should first help contain the damage from the attack, which may involve …..? computers or …..? network connections, and then work to remove the threat and clean up the damage.

A

quarantining

severing

39
Q

What is a good defense against Zero-Day attacks?

A

IPS Intrusion Prevention System

40
Q

(BYOD) stands for?

A

bring your own device

41
Q

A terminal that has no internal microprocessor and thus no processing power independent of its host computer.

A

Dumb terminal

42
Q

proxy servers that could act as a middleman, reading and parsing the traffic payload, and then forwarding it on to the intended destination if the payload was safe. This behavior was later incorporated into firewalls to provide a deeper level of inspection. Firewalls with this ability are commonly called …..? , or …..? because application is the seventh layer of the OSI model.

A

application-aware firewalls

Layer-7 firewalls

43
Q

This feature allows a firewall to identify traffic as conversational and automatically create temporary firewall rules to permit the response traffic to flow back to the sender. In this way, instead of maintaining a multitude of rules, in a firewall with …..? , you only need to create a firewall rule that allows the communication to begin.

A

stateful inspection (firewall)

44
Q

Copper-based wiring, such as …… cabling, is susceptible to electronic sniffing or listening devices because the electrons flowing through the cables create a perceptible electromagnetic field (EMF)

A

CAT6

CAT6a

45
Q

Untagged mode =

Tagging mode =

A

Untagged mode = Access mode

Tagging mode = Trunk mode

46
Q

Trunk mode attack would happen on what OSI layer?

(Attacks on ethernet switches.)

A

Data link, layer 2.

47
Q

ARP poisoning is a …..? type of attack, also know as ….?

A

Spoofing

Man-in-the-middle

48
Q

IEEE Standards

802.11 or more (but still 11)

Is wireless or wired?

A

Wireless

49
Q

IEEE Standards

802.3 (or more but still .3)

Is wired or wireless?

A

Wired

50
Q

Many …..? attacks use features within the ICMP, such as “ping.”

A

Denial of Service DoS

51
Q

What is end-to-end encryption?

Certificate authorities establish static routes for two systems to communicate.

Temporary VPN is established to protect all data communications.

Data is encrypted on the sender’s system and only the recipient is able to decrypt it.

Data is encrypted with a private pre-shared key and cannot be decrypted by the sender.

A

Data is encrypted on the sender’s system and only the recipient is able to decrypt it.

52
Q

A company provides access to employees’ tax and personal information via a public-facing web portal.

What should the company implement to encrypt employees’ web access to this information?

Transport layer security (TLS)

Network intrusion detection system (NIDS)

Advanced encryption standard (AES)

Two-factor authentication (2FA)

A

Transport layer security (TLS)

53
Q

Which network topology is being implemented when each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node?

Star

Full mesh

Ring

Bus

A

Ring

54
Q

What type of medium is commonly used within a 1000 Mbps Ethernet network?

CAT 5

CAT5e

Coax

Wireless

A

CAT5e

55
Q

Which command should be used to manually enter the default gateway for a computer?

route

ipconfig

arp

netstat

A

route

56
Q

Which command produces the following output?

Non-authoritative answer:
Name: www.google.com
Address: 172.217.11.132

dig

nslookup

whois

nmap

A

nslookup

57
Q

Which device is used to organize network cables as they run between switches and other network devices?

Jack

Hub

Patch panel

Router

A

Patch Panel

58
Q

Which network device is used to connect two or more network segments by performing OSI layer 3 functions like packet-forwarding?

Router

Repeater

Wire

Switch

A

Router

59
Q

Which device is responsible for implementing network address translation (NAT)?

Modem

Router

NIC

Switch

A

Router

60
Q

Which device could be used to send commands to the mainframe for remote execution in early mainframe installations?

Distributed screens

Dumb terminals

Execution displays

Command receivers

A

Dumb terminals

61
Q

…….? which ensures that even if one session key is compromised, that compromised key will only affect data exchanged in that encryption session, not in any past or future sessions.

A

perfect forward secrecy (PFS),

62
Q

Update to 802.11ac
Rebranded to Wi-Fi 6
Adds support for 6 GHz frequency range
Support for approximately 1–10 Gbps

Is the top wireless standard since 2019, most modern still in 2023.

Which standard from IEEE?

A

802.11ax

63
Q

Update to power over Ethernet (PoE) to support up to 100W devices

2018 IEEE most recent wired standard.

A

802.3bt

64
Q

Another use case is when a company currently uses services in one cloud provider but another cloud provider excels or provides cheaper services in a particular area, for example, machine learning or data warehousing.

This is an example of ….?

A

Multi Cloud

65
Q

…..? : A connector that supports two pairs of wires (four total); typically used in telephones.

A

RJ11

66
Q

…….?: This is an end connector typically used with Ethernet cables and supports four pairs (eight wires).

A

RJ45

67
Q

……?: Is the only cable that references 55 meters.

Which data transfer is 55gbps.

Which cable?

A

CAT6

68
Q

…..? Cable references 100 meter at 100Mbps.

Which cable?

A

CAT5

69
Q

……? are used to connect two computing devices of the same type directly to each other. In computers, this is accomplished via their network interface controllers (NIC) or switches.

A

Crossover cables

70
Q

three principles: …..? which limits access; ….? , which enables you to trust the information; and …..?, which ensures that you have access to the information.

A

confidentiality, which limits access

integrity, which enables you to trust the information

availability, which ensures that you have access to the information.

71
Q

Single-mode fiber optics cables are more expensive but single-mode carries higher bandwidth 50 times the distance of Multimode fiber optic Cables.

A