Security Fundamentals (Network security measures, ACL configurations, Secure management protocols) Flashcards

1
Q

What is the primary goal of network security?

A

To protect data and resources from unauthorized access or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a firewall do?

A

Monitors and controls incoming and outgoing network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an IDS?

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an IPS?

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a DMZ in networking?

A

A demilitarized zone used to isolate public-facing services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the principle of least privilege?

A

Users should only have the access necessary to perform their tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is multi-factor authentication?

A

A security system that requires more than one method of verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is encryption used for?

A

To protect data by making it unreadable without a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a VPN?

A

Virtual Private Network, used to securely connect to a network over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is port security?

A

A feature that restricts access to a switch port based on MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary goal of network security? (11)

A

To protect data and resources from unauthorized access or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a firewall do? (12)

A

Monitors and controls incoming and outgoing network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an IDS? (13)

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an IPS? (14)

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a DMZ in networking? (15)

A

A demilitarized zone used to isolate public-facing services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the principle of least privilege? (16)

A

Users should only have the access necessary to perform their tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is multi-factor authentication? (17)

A

A security system that requires more than one method of verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is encryption used for? (18)

A

To protect data by making it unreadable without a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a VPN? (19)

A

Virtual Private Network, used to securely connect to a network over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is port security? (20)

A

A feature that restricts access to a switch port based on MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the primary goal of network security? (21)

A

To protect data and resources from unauthorized access or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does a firewall do? (22)

A

Monitors and controls incoming and outgoing network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an IDS? (23)

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an IPS? (24)

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a DMZ in networking? (25)
A demilitarized zone used to isolate public-facing services
26
What is the principle of least privilege? (26)
Users should only have the access necessary to perform their tasks
27
What is multi-factor authentication? (27)
A security system that requires more than one method of verification
28
What is encryption used for? (28)
To protect data by making it unreadable without a key
29
What is a VPN? (29)
Virtual Private Network, used to securely connect to a network over the internet
30
What is port security? (30)
A feature that restricts access to a switch port based on MAC address
31
What is the primary goal of network security? (31)
To protect data and resources from unauthorized access or harm
32
What does a firewall do? (32)
Monitors and controls incoming and outgoing network traffic
33
What is an IDS? (33)
Intrusion Detection System
34
What is an IPS? (34)
Intrusion Prevention System
35
What is a DMZ in networking? (35)
A demilitarized zone used to isolate public-facing services
36
What is the principle of least privilege? (36)
Users should only have the access necessary to perform their tasks
37
What is multi-factor authentication? (37)
A security system that requires more than one method of verification
38
What is encryption used for? (38)
To protect data by making it unreadable without a key
39
What is a VPN? (39)
Virtual Private Network, used to securely connect to a network over the internet
40
What is port security? (40)
A feature that restricts access to a switch port based on MAC address
41
What is the primary goal of network security? (41)
To protect data and resources from unauthorized access or harm
42
What does a firewall do? (42)
Monitors and controls incoming and outgoing network traffic
43
What is an IDS? (43)
Intrusion Detection System
44
What is an IPS? (44)
Intrusion Prevention System
45
What is a DMZ in networking? (45)
A demilitarized zone used to isolate public-facing services
46
What is the principle of least privilege? (46)
Users should only have the access necessary to perform their tasks
47
What is multi-factor authentication? (47)
A security system that requires more than one method of verification
48
What is encryption used for? (48)
To protect data by making it unreadable without a key
49
What is a VPN? (49)
Virtual Private Network, used to securely connect to a network over the internet
50
What is port security? (50)
A feature that restricts access to a switch port based on MAC address
51
What is the primary goal of network security? (51)
To protect data and resources from unauthorized access or harm
52
What does a firewall do? (52)
Monitors and controls incoming and outgoing network traffic
53
What is an IDS? (53)
Intrusion Detection System
54
What is an IPS? (54)
Intrusion Prevention System
55
What is a DMZ in networking? (55)
A demilitarized zone used to isolate public-facing services
56
What is the principle of least privilege? (56)
Users should only have the access necessary to perform their tasks
57
What is multi-factor authentication? (57)
A security system that requires more than one method of verification
58
What is encryption used for? (58)
To protect data by making it unreadable without a key
59
What is a VPN? (59)
Virtual Private Network, used to securely connect to a network over the internet
60
What is port security? (60)
A feature that restricts access to a switch port based on MAC address
61
What is the primary goal of network security? (61)
To protect data and resources from unauthorized access or harm
62
What does a firewall do? (62)
Monitors and controls incoming and outgoing network traffic
63
What is an IDS? (63)
Intrusion Detection System
64
What is an IPS? (64)
Intrusion Prevention System
65
What is a DMZ in networking? (65)
A demilitarized zone used to isolate public-facing services
66
What is the principle of least privilege? (66)
Users should only have the access necessary to perform their tasks
67
What is multi-factor authentication? (67)
A security system that requires more than one method of verification
68
What is encryption used for? (68)
To protect data by making it unreadable without a key
69
What is a VPN? (69)
Virtual Private Network, used to securely connect to a network over the internet
70
What is port security? (70)
A feature that restricts access to a switch port based on MAC address
71
What does ACL stand for?
Access Control List
72
What is the purpose of an ACL?
To control network traffic by permitting or denying packets
73
Where can ACLs be applied?
On interfaces, either inbound or outbound
74
What is a standard ACL?
An ACL that filters traffic based only on source IP address
75
What is an extended ACL?
An ACL that filters traffic based on source, destination, protocol, and port
76
What is the command to create a standard ACL in Cisco IOS?
access-list [number] permit|deny [source]
77
What is the command to apply an ACL to an interface?
ip access-group [number] in|out
78
What does an implicit deny mean in ACLs?
Any traffic not explicitly permitted is denied by default
79
What ACL range is used for standard ACLs?
1 to 99 and 1300 to 1999
80
What ACL range is used for extended ACLs?
100 to 199 and 2000 to 2699
81
What does ACL stand for? (11)
Access Control List
82
What is the purpose of an ACL? (12)
To control network traffic by permitting or denying packets
83
Where can ACLs be applied? (13)
On interfaces, either inbound or outbound
84
What is a standard ACL? (14)
An ACL that filters traffic based only on source IP address
85
What is an extended ACL? (15)
An ACL that filters traffic based on source, destination, protocol, and port
86
What is the command to create a standard ACL in Cisco IOS? (16)
access-list [number] permit|deny [source]
87
What is the command to apply an ACL to an interface? (17)
ip access-group [number] in|out
88
What does an implicit deny mean in ACLs? (18)
Any traffic not explicitly permitted is denied by default
89
What ACL range is used for standard ACLs? (19)
1 to 99 and 1300 to 1999
90
What ACL range is used for extended ACLs? (20)
100 to 199 and 2000 to 2699
91
What does ACL stand for? (21)
Access Control List
92
What is the purpose of an ACL? (22)
To control network traffic by permitting or denying packets
93
Where can ACLs be applied? (23)
On interfaces, either inbound or outbound
94
What is a standard ACL? (24)
An ACL that filters traffic based only on source IP address
95
What is an extended ACL? (25)
An ACL that filters traffic based on source, destination, protocol, and port
96
What is the command to create a standard ACL in Cisco IOS? (26)
access-list [number] permit|deny [source]
97
What is the command to apply an ACL to an interface? (27)
ip access-group [number] in|out
98
What does an implicit deny mean in ACLs? (28)
Any traffic not explicitly permitted is denied by default
99
What ACL range is used for standard ACLs? (29)
1 to 99 and 1300 to 1999
100
What ACL range is used for extended ACLs? (30)
100 to 199 and 2000 to 2699
101
What does ACL stand for? (31)
Access Control List
102
What is the purpose of an ACL? (32)
To control network traffic by permitting or denying packets
103
Where can ACLs be applied? (33)
On interfaces, either inbound or outbound
104
What is a standard ACL? (34)
An ACL that filters traffic based only on source IP address
105
What is an extended ACL? (35)
An ACL that filters traffic based on source, destination, protocol, and port
106
What is the command to create a standard ACL in Cisco IOS? (36)
access-list [number] permit|deny [source]
107
What is the command to apply an ACL to an interface? (37)
ip access-group [number] in|out
108
What does an implicit deny mean in ACLs? (38)
Any traffic not explicitly permitted is denied by default
109
What ACL range is used for standard ACLs? (39)
1 to 99 and 1300 to 1999
110
What ACL range is used for extended ACLs? (40)
100 to 199 and 2000 to 2699
111
What does ACL stand for? (41)
Access Control List
112
What is the purpose of an ACL? (42)
To control network traffic by permitting or denying packets
113
Where can ACLs be applied? (43)
On interfaces, either inbound or outbound
114
What is a standard ACL? (44)
An ACL that filters traffic based only on source IP address
115
What is an extended ACL? (45)
An ACL that filters traffic based on source, destination, protocol, and port
116
What is the command to create a standard ACL in Cisco IOS? (46)
access-list [number] permit|deny [source]
117
What is the command to apply an ACL to an interface? (47)
ip access-group [number] in|out
118
What does an implicit deny mean in ACLs? (48)
Any traffic not explicitly permitted is denied by default
119
What ACL range is used for standard ACLs? (49)
1 to 99 and 1300 to 1999
120
What ACL range is used for extended ACLs? (50)
100 to 199 and 2000 to 2699
121
What does ACL stand for? (51)
Access Control List
122
What is the purpose of an ACL? (52)
To control network traffic by permitting or denying packets
123
Where can ACLs be applied? (53)
On interfaces, either inbound or outbound
124
What is a standard ACL? (54)
An ACL that filters traffic based only on source IP address
125
What is an extended ACL? (55)
An ACL that filters traffic based on source, destination, protocol, and port
126
What is the command to create a standard ACL in Cisco IOS? (56)
access-list [number] permit|deny [source]
127
What is the command to apply an ACL to an interface? (57)
ip access-group [number] in|out
128
What does an implicit deny mean in ACLs? (58)
Any traffic not explicitly permitted is denied by default
129
What ACL range is used for standard ACLs? (59)
1 to 99 and 1300 to 1999
130
What ACL range is used for extended ACLs? (60)
100 to 199 and 2000 to 2699
131
What does ACL stand for? (61)
Access Control List
132
What is the purpose of an ACL? (62)
To control network traffic by permitting or denying packets
133
Where can ACLs be applied? (63)
On interfaces, either inbound or outbound
134
What is a standard ACL? (64)
An ACL that filters traffic based only on source IP address
135
What is an extended ACL? (65)
An ACL that filters traffic based on source, destination, protocol, and port
136
What is the command to create a standard ACL in Cisco IOS? (66)
access-list [number] permit|deny [source]
137
What is the command to apply an ACL to an interface? (67)
ip access-group [number] in|out
138
What does an implicit deny mean in ACLs? (68)
Any traffic not explicitly permitted is denied by default
139
What ACL range is used for standard ACLs? (69)
1 to 99 and 1300 to 1999
140
What ACL range is used for extended ACLs? (70)
100 to 199 and 2000 to 2699
141
What is SSH used for?
Secure remote access to devices
142
What port does SSH use?
Port 22
143
What is the difference between SSH and Telnet?
SSH encrypts data, Telnet does not
144
What is SNMP?
Simple Network Management Protocol
145
What is the secure version of SNMP?
SNMPv3
146
What protocol is used to secure web management interfaces?
HTTPS
147
What port does HTTPS use?
Port 443
148
What is a management VLAN?
A dedicated VLAN used for managing network devices
149
What is role-based access control (RBAC)?
Restricting access based on user roles
150
What is the purpose of syslog?
To collect and store log messages from devices
151
What is SSH used for? (11)
Secure remote access to devices
152
What port does SSH use? (12)
Port 22
153
What is the difference between SSH and Telnet? (13)
SSH encrypts data, Telnet does not
154
What is SNMP? (14)
Simple Network Management Protocol
155
What is the secure version of SNMP? (15)
SNMPv3
156
What protocol is used to secure web management interfaces? (16)
HTTPS
157
What port does HTTPS use? (17)
Port 443
158
What is a management VLAN? (18)
A dedicated VLAN used for managing network devices
159
What is role-based access control (RBAC)? (19)
Restricting access based on user roles
160
What is the purpose of syslog? (20)
To collect and store log messages from devices
161
What is SSH used for? (21)
Secure remote access to devices
162
What port does SSH use? (22)
Port 22
163
What is the difference between SSH and Telnet? (23)
SSH encrypts data, Telnet does not
164
What is SNMP? (24)
Simple Network Management Protocol
165
What is the secure version of SNMP? (25)
SNMPv3
166
What protocol is used to secure web management interfaces? (26)
HTTPS
167
What port does HTTPS use? (27)
Port 443
168
What is a management VLAN? (28)
A dedicated VLAN used for managing network devices
169
What is role-based access control (RBAC)? (29)
Restricting access based on user roles
170
What is the purpose of syslog? (30)
To collect and store log messages from devices
171
What is SSH used for? (31)
Secure remote access to devices
172
What port does SSH use? (32)
Port 22
173
What is the difference between SSH and Telnet? (33)
SSH encrypts data, Telnet does not
174
What is SNMP? (34)
Simple Network Management Protocol
175
What is the secure version of SNMP? (35)
SNMPv3
176
What protocol is used to secure web management interfaces? (36)
HTTPS
177
What port does HTTPS use? (37)
Port 443
178
What is a management VLAN? (38)
A dedicated VLAN used for managing network devices
179
What is role-based access control (RBAC)? (39)
Restricting access based on user roles
180
What is the purpose of syslog? (40)
To collect and store log messages from devices
181
What is SSH used for? (41)
Secure remote access to devices
182
What port does SSH use? (42)
Port 22
183
What is the difference between SSH and Telnet? (43)
SSH encrypts data, Telnet does not
184
What is SNMP? (44)
Simple Network Management Protocol
185
What is the secure version of SNMP? (45)
SNMPv3
186
What protocol is used to secure web management interfaces? (46)
HTTPS
187
What port does HTTPS use? (47)
Port 443
188
What is a management VLAN? (48)
A dedicated VLAN used for managing network devices
189
What is role-based access control (RBAC)? (49)
Restricting access based on user roles
190
What is the purpose of syslog? (50)
To collect and store log messages from devices
191
What is SSH used for? (51)
Secure remote access to devices
192
What port does SSH use? (52)
Port 22
193
What is the difference between SSH and Telnet? (53)
SSH encrypts data, Telnet does not
194
What is SNMP? (54)
Simple Network Management Protocol
195
What is the secure version of SNMP? (55)
SNMPv3
196
What protocol is used to secure web management interfaces? (56)
HTTPS
197
What port does HTTPS use? (57)
Port 443
198
What is a management VLAN? (58)
A dedicated VLAN used for managing network devices
199
What is role-based access control (RBAC)? (59)
Restricting access based on user roles
200
What is the purpose of syslog? (60)
To collect and store log messages from devices