Topic 1.4 - Network Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is network security?

A

Network security refers to the measures and practices taken to protect computer networks and their data from unauthorized access and threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a threat in network security?

A

A threat is a potential danger or risk to the security of a network, which could result in harm or loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a vulnerability?

A

A vulnerability is a weakness or gap in a network’s defenses that can be exploited by threats to compromise security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an attack in network security?

A

An attack is an intentional, harmful action against a network, aimed at exploiting vulnerabilities or causing damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a security breach?

A

A security breach is an unauthorized access or exposure of sensitive data within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is encryption in network security?

A

Encryption is the process of encoding data to make it unreadable to unauthorized users, providing confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is authentication?

A

Authentication is the process of verifying the identity of users or devices before granting access to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is authorisation?

A

Authorisation is the process of determining what actions or resources a user or device is allowed to access within the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is intrusion detection and prevention?

A

Intrusion detection and prevention systems (IDPS) monitor network traffic for suspicious activity and can take actions to prevent or mitigate threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is antivirus software?

A

Antivirus software is designed to detect and remove malware, such as viruses, worms, and Trojans, from a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a malware?

A

Malware is malicious software that includes viruses, worms, Trojans, and other harmful programs designed to disrupt or damage a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a DDoS attack?

A

A Distributed Denial of Service (DDoS) attack floods a network or server with traffic to overwhelm and disrupt services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a phishing attack?

A

A phishing attack uses fraudulent emails or websites to trick users into revealing sensitive information, such as login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a man-in-the-middle attack?

A

A man-in-the-middle attack intercepts and potentially alters communications between two parties without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ransomware?

A

Ransomware is a type of malware that encrypts a network’s data and demands a ransom for the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SSL/TLS?

A

SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are protocols that provide secure data transmission over the internet, often used for securing websites.

17
Q

What is IPsec?

A

IPsec (Internet Protocol Security) is a suite of protocols used to secure communication at the network layer, often used in VPNs.

18
Q

What is SSH (Secure Shell)?

A

SSH is a secure network protocol that allows for secure remote access and file transfer over an encrypted connection.

19
Q

What is WPA2/WPA3?

A

WPA2 (Wi-Fi Protected Access 2) and WPA3 are security protocols used to secure wireless networks, with WPA3 being the more recent and secure version.

20
Q

What is the principle of least privilege?

A

The principle of least privilege advocates granting users or devices the minimum level of access necessary to perform their tasks, reducing potential security risks.

21
Q

What is a security policy?

A

A security policy is a set of guidelines and rules that define how network security is managed and maintained within an organization.

22
Q

What is a security audit?

A

A security audit is an evaluation of a network’s security measures to identify vulnerabilities and ensure compliance with security policies.

23
Q

What is patch management?

A

Patch management involves applying updates and patches to network software and hardware to address known vulnerabilities and improve security.

24
Q

What is IoT security?

A

IoT security focuses on securing internet-connected devices, such as smart appliances and sensors, which may have security vulnerabilities.

25
Q

What is cloud security?

A

Cloud security involves securing data and applications stored in cloud services and ensuring their protection from cyber threats.

26
Q

What is AI and machine learning in network security?

A

AI and machine learning are used in network security to detect and respond to threats by analyzing large volumes of data and identifying patterns.

27
Q

What is zero-day vulnerability?

A

A zero-day vulnerability is a security flaw that is exploited by attackers before a patch or fix is available, posing a significant threat.

28
Q

What is a security incident response plan?

A

A security incident response plan outlines the actions to be taken in the event of a security breach, helping to minimize damage and recover quickly.