Networks and Network Security Flashcards

Module Four

1
Q

What is the purpose of a baseline configuration (baseline image)?

A

A documented set of specifications within a system used as a basis for future builds, releases, and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the shared responsibility model in cloud security.

A

A model where the cloud service provider (CSP) is responsible for security of the cloud infrastructure, and the customer is responsible for securing the data and services they store in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is identity access management (IAM) in cloud security?

A

A collection of processes and technologies that manage digital identities and authorize how users can use cloud resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a hypervisor contribute to cloud security?

A

It abstracts the host’s hardware from the operating software environment, providing an additional layer of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is cryptographic erasure?

A

A method of erasing data by destroying the encryption keys, making the data undecipherable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is network log analysis important for security?

A

It helps identify events of interest by examining network logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key functions of a Security Information and Event Management (SIEM) tool?

A

Collecting and analyzing log data to monitor critical activities and report suspicious events in a centralized dashboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is multi-factor authentication (MFA)?

A

A security measure that requires users to verify their identity in two or more ways to access a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the role of patch updates in security hardening.

A

They fix known security vulnerabilities and upgrade software to the latest version to enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does network segmentation achieve in security?

A

It creates isolated subnets for different departments, enhancing security by limiting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is port filtering used in network security?

A

To disable unused ports and reduce the attack surface, preventing unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of an intrusion detection system (IDS)?

A

To detect and alert administrators about possible intrusions and malicious traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does an intrusion prevention system (IPS) differ from an IDS?

A

An IPS not only detects but also takes action to stop intrusive activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the significance of a virtual private network (VPN) in network security?

A

it encrypts data in transit and masks the user’s IP address, enhancing privacy and security on public networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a smurf attack?

A

A network attack where an attacker sniffs an authorized user’s IP address and floods it with ICMP packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define a replay attack.

A

An attack where a malicious actor intercepts a data packet in transit and delays or repeats it at another time.

17
Q

What is the role of a firewall in network security?

A

To monitor and filter incoming and outgoing network traffic based on security rules.

18
Q

Describe the concept of defense in depth.

A

An approach of adding multiple layers of security to protect a network.

19
Q

What is the purpose of using flow logs in cloud security?

A

To provide visibility into network traffic and help identify potential security threats.

20
Q

How does an on-path attack compromise security?

A

By intercepting and potentially altering communication between two trusted devices.

21
Q

Why is cloud configuration important for security?

A

Proper configuration ensures compliance with security requirements and prevents vulnerabilities.

22
Q

What is the attack surface in network security?

A

All the potential system vulnerabilities that a threat actor could exploit.

23
Q

What does the term “world-writable file” mean in security?

A

A file that can be altered by anyone in the world, posing a significant security risk.

24
Q

How can cryptography enhance cloud security?

A

By using encryption to provide data integrity and confidentiality for data processed and stored in the cloud.

25
Q
A