Networks Flashcards

1
Q

What does VPN mean?

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a VPN do?

A

Encrypts your data and hides your IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is HTTP

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is HTTPS

A

Hypertext Transfer Protocol Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name Three methods of seeing if your website is secure

A
  • There is a padlock on the search bar
  • The search bar is highlighted green
  • The start of the link says HTTPS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the OSI Model, what Layer is the HTTP and HTTPS located at?

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What port does HTTP use?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What port does HTTPS use?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does VoIP mean?

A

Voice Over Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does VoIP work?

A

Sends your voice to another user through data

Video Conferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Remote Wipe?

A

Deleting the data from your device remotley

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When is Remote Wipe useful?

A

When a device has been lost or stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Remote Desktop?

A

The ability to access a computer on a network from a distance.

(RDP onto desktop at work from home)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does BYOD mean?

A

Bring Your Own Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the no1 condition of BYOD?

A

The device must be permitted on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mobile Security Policy Technical Requirements

A
  • Devices must use the following operation systems: Android 2.2 or later, IOS 4.x or later.
  • Must store all user-saved passwords in an encrypted password store.
  • Devices must be configured with a secure password that complies with a companies password policy. Must not be the same as any other password.
17
Q

Mobile Security Policy User Requirements

A
  • Users must only load data essential to their role onto their mobile devices
  • Users must report all lost or stolen devices to IT immediately.
  • If a user suspects that unauthorised access to a company data has taken place via a mobile device the user must report the incident in alignment with company’s incident handling process.
  • Devices must not be jailbroken
18
Q

What does C mean in the CIA Triangle

A

Confidentiality

19
Q

What does I mean in the CIA Triangle

A

Integrity

20
Q

What does A mean in the CIA Triangle

A

Availability