Networks and Networks security Flashcards

module one

1
Q

What is the primary function of a Security Information and Event Management (SIEM) tool?

A

To collect and analyze log data to monitor critical activities in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the principle of defense-in-depth.

A

Implementing multiple layers of security measures to protect a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the confidentiality aspect of the CIA triad ensure?

A

Only authorized users can access specific assets or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does an IDS differ from an IPS?

A

An IDS detects and alerts about possible intrusions, while an IPS takes action to stop them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define the role of a firewall in network security.

A

A firewall allows or blocks traffic based on a set of security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of a physical security hardening measure?

A

Installing security cameras or hiring security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the concept of network segmentation.

A

Dividing a network into segments to improve security and performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the integrity aspect of the CIA triad ensure?

A

Data is correct, authentic, and reliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the purpose of a baseline configuration.

A

A set of specifications used as a reference point for future builds, releases, and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a common use of port filtering in network security?

A

To block or allow specific port numbers to control network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define the term ‘attack surface.’

A

All the potential vulnerabilities that a threat actor could exploit in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does multi-factor authentication (MFA) enhance security?

A

By requiring users to verify their identity in two or more ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a key responsibility of a cloud service provider (CSP) under the shared responsibility model?

A

Managing the security of the cloud infrastructure, including physical data centers and hypervisors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the function of an intrusion detection system (IDS)?

A

To monitor system activity and alert administrators to possible intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does cryptography help in cloud security?

A

By using encryption to ensure data integrity and confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does a penetration test aim to achieve?

A

Identifying vulnerabilities in systems, networks, websites, applications, and processes through a simulated attack.

17
Q

Describe the purpose of network log analysis.

A

Examining network logs to identify events of interest and detect potential security incidents.

18
Q

What is the benefit of using a hypervisor in cloud environments?

A

It abstracts the host’s hardware from the operating software environment to improve resource management and security.

19
Q

Explain the role of patch updates in security hardening.

A

Fixing known security vulnerabilities in software and operating systems.

20
Q

What is a virtual private network (VPN) used for?

A

Encrypting data in transit to provide secure communication over public networks.

21
Q

How does a replay attack operate?

A

By intercepting a data packet in transit and delaying it or repeating it at another time.

22
Q

What is the significance of the availability aspect of the CIA triad?

A

Ensuring that data is accessible to authorized users when needed.

23
Q

Describe the principle of least privilege.

A

Providing users only the access that is necessary for their roles to minimize security risks.

24
Q

What is the impact of a Distributed Denial of Service (DDoS) attack?

A

Overwhelming a network with unwanted traffic, causing system unavailability.

25
Q

How can a firewall be configured to prevent IP spoofing attacks?

A

By implementing source IP address verification to check for spoofed IP addresses.