Networks and Network Security Flashcards

module two

1
Q

What network protocol is used to determine the MAC address of the next router or device on a path?

A

Address Resolution Protocol (ARP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which protocol is used to translate internet domain names into IP addresses?

A

Domain Name System (DNS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define encapsulation in the context of network security.

A

The process of wrapping sensitive data in other data packets to protect information in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a smurf attack?

A

A network attack where an attacker sniffs an authorized user’s IP address and floods it with ICMP packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the role of a forward proxy server.

A

It regulates and restricts a person’s access to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of attack involves intercepting and altering communication between two devices?

A

On-path attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a reverse proxy server function in network security?

A

It regulates and restricts the internet’s access to an internal server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does TCP stand for and what is its purpose?

A

Transmission Control Protocol; it allows two devices to form a connection and stream data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a demilitarized zone (DMZ) in network security?

A

To act as a network perimeter that isolates servers exposed to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the concept of packet sniffing.

A

The practice of capturing and inspecting data packets across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an ICMP flood attack?

A

A DoS attack where an attacker repeatedly sends ICMP request packets to a network server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can using a VPN protect against packet sniffing?

A

By encrypting data as it travels across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the purpose of port filtering.

A

To block or allow certain port numbers to control network communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is IP spoofing and how does it compromise a network?

A

Changing the source IP of a data packet to impersonate an authorized system and gain network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does a SYN flood attack work?

A

By simulating a TCP connection and flooding a server with SYN packets, overwhelming it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of attack sends an oversized ICMP packet to a server, causing it to crash?

A

Ping of Death.

17
Q

Define passive packet sniffing.

A

A type of attack where a malicious actor connects to a network hub and monitors all traffic without altering it.

18
Q

What does a security incident report typically include?

A

A summary of the incident, type of attack, systems impacted, protection plan, detection methods, response plan, and recovery procedures.

19
Q

How does a firewall help in protecting a network?

A

By monitoring and filtering incoming and outgoing network traffic based on security rules.

20
Q

What is the purpose of using a controlled zone in network security?

A

To protect a company’s internal network from an uncontrolled security zone.

21
Q

Explain the concept of a botnet.

A

A collection of computers infected by malware under the control of a single threat actor.

22
Q

How does network segmentation improve security?

A

By creating isolated subnets for different departments, limiting access to specific areas of the network.

23
Q

What is the function of network log analysis?

A

Examining network logs to identify events of interest and detect potential security incidents

24
Q

Why is multi-factor authentication (MFA) important in network security?

A

It requires users to verify their identity in two or more ways to access a system, enhancing security.

25
Q

It requires users to verify their identity in two or more ways to access a system, enhancing security.

A

By ensuring all cloud services meet security and compliance requirements, reducing vulnerabilities.