Networks and Network Security Flashcards

1
Q

What are networks?

A

A group of connected devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a LAN?

A

Local Area Network

a network that spans a small area life home, schools or office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a WAN?

A

Wide Area Network

a network that spans a wide geographic area like a city, state or country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a hub?

A

A network device that broadcast information to every device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a switch?

A

a device that make connections between specific devices on a network by sending and receiving data between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a router?

A

a network that connects multiple devices together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a modem?

A

It connects the router to the internet and brings internet access to the lan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a virtualization tool?

A

Pieces of software that performs network operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is cloud computing?

A

The practice of using remote servers, applications and network services that are hosted on the internet instead of on local physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a cloud network?

A

A collection of servers or computers that store resources and data in remote data centers that can be accessed via internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a data packet?

A

A basic unit information that travels from one device to another within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is bandwidth?

A

The amount of data a device receives every second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is speed?

A

The rate at which data packets are received or downloaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is packet sniffing?

A

The practice of capturing and inspecting data packets across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Transmission Control Protocol, also called TCP stands for what?

A

An internet communication protocol that allows two devices to form a connection and stream data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Internet Protocol, also called IP stands for what?

A

A set of standards used for routing and addressing data packets as they travel between devices on a networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a port?

A

a software based location that organizes sending and receiving of data between devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Port 25 is for what?

A

Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Port 443 is for what?

A

secured internet communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

port 20 is for what?

A

Large file transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the TCP/IP model?

A

a framework used to visualize how data is organized and transmitted across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the 4 layers of the TCP/IP Model?

A
  1. Network access layer
  2. Internet layer
  3. Transport layer
  4. Application layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The TCP/IP model is a condensed form of what model?

A

OSI Open systems interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How many layers is the OSI?

A

7 Layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is an IP address?

A

A unique string of characters that identifies the location a device on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How many type of IP addresses are there?

A

2
IP Version 4 (IPv4)
IP Version 6 (IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Example of IPv4?

A

19.117.63.126

smaller than IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Example of IPv6

A

684D:1111:222:3333:4444:5555:6:77

consist of 32 characters

larger than IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a MAC address?

A

A unique alphanumeric identifier that is assigned to each physical device on an network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a User Datagram Protocol (UDP)

A

A connectionless protocol that does not establish a connection between devices before transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Network Protocols

A

A set of rules used by two or more devices on a network to describe the order of delivery and structure of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Address resolution protocol (ARP)

A

a network protocol used to determine the MAC address of the next router or device on the path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Hypertext transfer protocol Secure (HTTPS)

A

a network protocol that provides a secure method of communication between clients and web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Domain Name System (DNS)

A

A network protocol that translates internet domain into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Network Protocols are divided into what 3 main categories ?

A
  1. Communication protocols
  2. Management protocols
  3. Security protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

IEEE 802.11 ( WiFi)

A

A set of standards that define communication for wireless LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

WiFi Protected Access (WPA)

A

A wireless security protocol for devices to connect to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Firewall

A

Is a network security device that monitors traffic to and from your network

39
Q

Port filtering

A

A firewall function that blocks or allows certain port numbers to limit unwanted communication

40
Q

Cloud based firewalls

A

Software firewalls that are hosted b y a cloud based provider

41
Q

Stateful

A

A class of firewall that keeps track of information passing through it and proactively filters out threats.

42
Q

Stateless

A

A class of firewall that operates based open predefined rules and does not keep track of information from data packets

43
Q

What is NGFW

A

Next Generation Firewalls

44
Q

What are the benefits of NGFW/ Next generation Firewalls

A
  1. Deep Packet inspection
    2.Intrusion protection
  2. Threat intelligence
45
Q

Virtual Private Network, also known as a VPN

A

A network security service that changes your public IP address and hides your virtual location so that you can keep your data packet private when using a public network like the internet

46
Q

Encapsulation

A

A processed performed by a VPN service that protects your data by wrapping sensitive data in other data packets.

47
Q

Security zone

A

A segment of a network that protects the internal network from the internet

48
Q

Network segmentation

A

a security technique that divides the network into different segments

49
Q

What are the two types of security zones?

A
  1. Uncontrolled zones
  2. Controlled zones
50
Q

Uncontrolled zone

A

Any network outside of the organizationals control

51
Q

Controlled zone

A

A subnet that protects the internal network from the uncontrolled zone

52
Q

Areas in the controlled zone

A
  1. Demilitarized zone
  2. Internal networks
  3. Restricted zone
53
Q

Subnetting

A

is the process of dividing a larger network into smaller, more manageable subnetworks

54
Q

CIDR IP addresses are formatted like IPv4 addresses, but they include a ____ followed by a number at the end of the address

A

slash (“/’”)

198.51.100.0/24

55
Q

Proxy server

A

A server that refills the request of a client by forwarding them to other servers

56
Q

Forward proxy server

A

Regulates and restricts a person’s access to the internet

57
Q

Reverse proxy server

A

Regulates and restricts the internet access to an internal server

58
Q

Secure shell (SSH)

A

A security protocol used to create a shell with a remote system

59
Q

What are some common network intrusion attack?

A
  1. Malware
    2.Spoofing
  2. Packet sniffing
    4.Packet flooding
60
Q

Attacks can harm an organization by

A
  1. Leaking valuable or confidential information
  2. Damaging an organization reputation
  3. Impacting customer retention
  4. Costing money and time
61
Q

Denial of service (DoS)

A

a attack that targets a network or server and flood it with network traffic

62
Q

Distributed denial of service attack (DDos)

A

a type of denial of service attack that uses multiple devices or servers in different locations to flood the target network with unwanted traffic.

63
Q

SYN (synchronize) Flood attack

A

a type of Dos attack that simulates a TCP connection and floods a server with SYN packets

64
Q

Internet Control Message Protocol

ICMP

A

An internet protocol used by devices to tell each other about data transmission errors across the network

65
Q

Internet Control Message Protocol Flood

A

A type of Dos attack performed by an attacker repeadetly sending ICMP packets to a network server

66
Q

Ping of death

A

a type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB

67
Q

What is a Network Protocol Analyzer

A

Also know as a packet analyzer, is a tool designed to capture and analyze data traffic within a network. They are commonly used as investigative tools to monitor networks and identify suspicious activity.

68
Q

Tcpdump

A

a command-line network protocol analyzer.

tcpdump provides a brief packet analysis and converts key information about network traffic into formats easily read by humans

69
Q

botnet

A

a collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder.”

Each computer in the botnet can be remotely controlled to send a data packet to a target system.

In a botnet attack, cyber criminals instruct all the bots on the botnet to send data packets to the target system at the same time, resulting in a DDoS attack.

70
Q

Passive packet sniffing

A

a type of attack where data are read in transit

71
Q

Active packet sniffing

A

a type of attack where data is manipulated in transit

72
Q

IP Spoofing

A

A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network

73
Q

Common IP spoofing attacks

A
  1. On path attacks
  2. Replay attacks
  3. Smurf attacks
74
Q

On path attack

A

An attack where malicious actor places themselves in the middle of an authorized connection and intercepts and alters the data in transit.

75
Q

Replay attacks

A

A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time.

76
Q

Smurf attacks

A

a network attack performed when an attacker sniffs and authorized user IP address and floods it with packets.

77
Q

Where can security hardening occur?

A
  1. devices
  2. networks
  3. applications
  4. cloud infrastructures
78
Q

Security hardening

A

the process of strengthening a system to reduce its vulnerability and attack surface

79
Q

attack surface

A

all the potential vulnerabilities that an threat actor could exploit

80
Q

security hardening is conducted on?`

A
  1. Hardware
  2. Operating systems
  3. Applications
  4. computer network
  5. Database
81
Q

Penetration testing AKA Pen Testing

A

A simulated attack that helps identify vulnerabilities in a system, network, websites, applications and processes.

82
Q

Operating System AKA OS

A

The interface between computer hardware and the user.

83
Q

Patch Update

A

A software and operating system update that addresses security vulnerabilities within a program or product

84
Q

Baseline configuration (baseline image)

A

a documented set of specifications within a system that is used as a basis for future builds, release and updates.

85
Q

Multi-Factor authentication AKA MFA

A

a security measure which requires a user to verify identity in two or more ways to access a system or network.

86
Q

brute force attack

A

a trial-and-error process of discovering private information.

87
Q

Network security hardening focuses on what?

A
  1. Port filtering
    2.Network access privilege
  2. Encryption
88
Q

Network log analysis

A

the process of examining network logs to identify event of interest

89
Q

System information and event management tools (SIEM)

A

An application that collects and analyzes log data to monitor critical activities in an organization

90
Q

port filtering

A

a firewall function that blocks or allows certain port numbers to limit unwanted communications

91
Q

intrusion prevention system (IPS)

A

is an application that monitors system activity for intrusive activity and takes action to stop the activity.

92
Q

Cloud Network

A

a collection of servers or computers that stores resources and data in remote data centers that can be accessed via internet.

93
Q

World-writable file

A

A file that can be altered by anyone in the world