Network Security & Infrastructure Flashcards

Net+ N10-009

1
Q

ARP Spoofing

A

Occurs when an attacker sends falsified ARP messages, linking their MAC address with a legitimate IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARP Poisoning

A

Corrupts ARP cache by associating attacker’s MAC with IP addresses of LAN devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS Poisoning

A

When fake information is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Double Tagging

A

A method where the attacker tries to reach a different VLAN using vulnerabilities in the trunk port configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Switch Spoofing

A

Occurs when an attacker attempts to use the Dynamic Trunking Protocol (DTP) to negotiate a trunk port with a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On-Path Attack

A

An attack where the penetration tester places their workstation between two hosts to capture, monitor, and relay communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rogue Devices

A

Unauthorized devices or services on a network that allows unauthorized individuals to connect to that network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Replay Attack

A

Occurs when an attacker captures valid data and repeats it either immediately or with a delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSL Stripping

A

Redirecting HTTPS requests to HTTP to capture unencrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Relay Attack

A

Attacker becomes a proxy between two hosts, intercepting and potentially modifying communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Taps

A

Physical device that is attached to cabling to record packets passing over the network segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Discretionary Access Control (DAC)

A

Access control method where owners of resources determine access permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mandatory Access Control (MAC)

A

Access control policy where the computer system determines access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Need-to-Know Principle

A

Users must have both the necessary clearance level and a need to know to access information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Power Users

A

A user group with permissions between regular users and administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Role-Based Access Control (RBAC)

A

Access control model based on defining roles for job functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Role-Based Groups

A

-Grouping users based on their job functions
-Assigning permissions to groups rather than individual users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SAML (Security Assertion Markup Language)

A

Exchanging authentication and authorization data between an identity provider and a service provider, enabling single sign-on (SSO) for users across different applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Diffie-Hellman Key Exchange

A

Allows two systems that do not know each other to be able to exchange keys and trust each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Transport Mode

A

-Uses original IP header
-Suitable for client-to-site VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Kerberos

A

Uses secret-key cryptography and a trusted third party to provide secure, mutual authentication between clients and servers over an insecure network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Authentication Header (AH)

A

Provides data integrity and origin authentication, but not confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Tunneling Mode

A

-Encapsulates the entire packet
-Suitable for site-to-site VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Encapsulating Security Payload (ESP)

A

Provides authentication, integrity, replay protection, and confidentiality of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Wildcard Certificate

A

Allows multiple subdomains to use the same public key certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Single-Sided Certificate

A

-Authenticates only the server to the user
-Requires no certificate from the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Dual-Sided Certificate

A

-Requires both server and user to validate each other using certificates
-Offers higher security but requiring more processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Root of Trust

A

Validates certificates in a chain from a trusted root certificate authority, ensuring trustworthiness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Certificate Authority (CA)

A

-Issues digital certificates
-Contains CA details, serial number, issue/expiry dates, and version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Registration Authority (RA)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Certificate Revocation List (CRL)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Certificate Signing Request (CSR)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Key Recovery Agents

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Key Escrow Agents

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Packet Filtering Firewall

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Stateful Firewall

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Stateless Firewall

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Next-Generation Firewall (NGFW)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Trusted Zone

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Unified Threat Management (UTM) System

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Explicit Allow

A
42
Q

Explicit Deny

A
43
Q

Implicit Deny

A
44
Q

Untrusted Zone

A
45
Q

Screened Subnet

A
46
Q

Internet Facing Hosts

A
47
Q

Bastion Host

A
48
Q

Jumpbox

A
49
Q

Web Proxy

A
50
Q

Reverse Proxy

A
51
Q

SAN Field

A
52
Q

AES (Advanced Encryption Standard)

A
53
Q

EAPOL (Extensible Authentication Protocol over LAN)

A
54
Q

DNSSEC (Domain Name System Security Extensions)

A
55
Q

SSL (Secure Sockets Layer)

A
56
Q

WAN (Wide Area Network)

A
57
Q

WLAN (Wireless Land Area Network)

A
58
Q

MAN (Metropolitan Area Network)

A
59
Q

Peer to Peer LAN

A
60
Q

Client Server

A
61
Q

CAN (Campus Area Network)

A
62
Q

OSPF (Open Shortest Path First)

A
63
Q

ACL (Access Control List)

A
64
Q

IAM (Identity and Access Management)

A
65
Q

API (Application Programming Interface)

A
66
Q

SMB (Server Message Block)

A
67
Q

SVI (Switch Virtual Interface)

A
68
Q

MAC (Media Access Control)

A
69
Q

CAM (Content-addressable Memory)

A
70
Q

ZTA (Zero Trust Architecture)

A
71
Q

Connector Types

A

SC, LC, ST, RJ45

72
Q

SC

A
73
Q

LC

A
74
Q

ST

A
75
Q

RJ45

A
76
Q

PDU

A
77
Q

Power Load Management

A
78
Q

RPO (Recovery Point Objective)

A
79
Q

Malware

A
80
Q

RTO (Recovery Time Objective)

A
81
Q

MTD (Maximum Tolerable Downtime)

A
82
Q

attenuation

A
83
Q

address pool exhaustion

A
84
Q

Congestion

A
85
Q

interference

A
86
Q

bottlenecking

A
87
Q

Scalability

A
88
Q

Elasticity

A
89
Q

Multitenancy

A
90
Q

GRE (Generic Routing Encapsulation)

A
91
Q

Star (hub and spoke) Topology

A
92
Q

Mesh Topology

A
93
Q

Hybrid Network Topology

A
94
Q

Spine-Leaf Architecture

A
95
Q

point-to-point connection

A
96
Q

Core (Three-tier architecture)

A
97
Q

Least privilege access

A
98
Q

SASE (Secure Access Service Edge)

A
99
Q

VIP (virtual IP address)

A
100
Q

TTL (Time to Live)

A

Wait’s until data traversing a number of hops, or wait until a certain amount of time elapses to stop or drop a packet.