Chapter 4 Flashcards

(87 cards)

1
Q

is two or more computers linked together to share data, information or resources.

A

Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2 basic types of networks

A

Local Area Network (LAN)
Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is a network typically spanning a single floor or building. This is commonly a limited geographical area.

A

Local Area Network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is the term usually assigned to the long-distance connections between geographically remote networks.

A

Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

They are used to connect multiple devices in a network.

A

Hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

are wired devices and are not as smart as switches or routers.

A

Hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

are wired devices that know the addresses of the devices connected to them and route traffic to that port/device rather than retransmitting to all devices.

A

Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

are used to control traffic flow on networks and are often used to connect similar networks and control traffic flow between them.

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

are essential tools in managing and controlling network traffic and protecting the network.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a network device used to filter traffic

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a computer that provides information to other computers on a network.

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the common servers?

A

web servers
email servers
print servers
Database servers
file servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

are the ends of a network communication link

A

endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a standard that defines wired connections of networked devices.

A

ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

represents the network interface within the network and can be useful to maintain communications when a physical device is swapped with new hardware.

A

Internet Protocol (IP) Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

also known as the host or application layer, is responsible for managing the integrity of a connection and controlling the session as well as establishing, maintaining and terminating communication sessions between two computers.

A

upper layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is often referred to as the media or transport layer and is responsible for receiving bits from the physical connection medium and converting them into a frame.

A

lower layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

are grouped into standardized sizes.

A

frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

it was developed to establish a common way to describe the communication structure for interconnected computer systems.

A

Open Systems Interconnection(OSI) model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

it serves as an abstract framework, or theoretical model, for how protocols should function in an ideal world, on ideal hardware.

A

OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

it has become a common conceptual reference that is used to understand the communication of various hierarchical components from software interfaces to physical hardware.

A

OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

it is the addition of header and possibly a footer (trailer) data by a protocol used at that layer of the OSI model.

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The inverse action occurs as data moves up the OSI model layers from Physical to Application. This process is known as?

A

De-encapsulation (or decapsulation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is TCP/IP?

A

Transmission Control Protocol/Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
it defines the protocols for the transport layer
application layer
26
it permits data to move among devices
transport layer
27
it creates/inserts packets
internet layer
28
it refers to how data moves through the network
network interface layer
29
what is UDP?
User Datagram Protocol
30
it is a popular method of connecting corporate and home systems because of the ease of deployment and relatively low cost.
wireless networking
31
There are physical ports that you connect wires to and logical ports that determine where the data/traffic goes.
Ports and Protocols (Applications/Services)
32
are the ports on the routers, switches, servers, computers, etc. that you connect the wires
Physical ports
33
(also called a socket) is little more than an address number that both ends of the communication link agree to use when transferring data.
logical port
34
allow a single IP address to be able to support multiple simultaneous communications, each using a different port number.
ports
35
A standard tcp/ip ports that sends the username and password using plaintext from the client to the server.
21 - FTP
36
A standard tcp/ip ports that is used by many Linux systems as a basic text-based terminal.
23-telnet
37
A standard tcp/ip ports that the default unencrypted port for sending email messages.
25 - SMTP
38
A standard tcp/ip ports that, may be in use by legacy equipment and has mostly been replaced by using port 123 for Network Time Protocol.
37 - Time
39
A standard tcp/ip ports that is still used widely. however, using this over TLS (DoT) on port 853 protects DNS information from being modified in transit.
53 - DNS
40
A standard tcp/ip ports that is the basis of nearly all web browser traffic on the internet, information sent via HTTP is not encrypted and is susceptible to sniffing attacks.
80 - HTTP
41
A standard tcp/ip ports that is a protocol used for retrieving emails.
143 - IMAP
42
A standard tcp/ip ports which is commonly used to send and received data used for managing infrastructure devices.
161/162 - SNMP
43
A standard tcp/ip ports that is used by many versions of Windows for accessing files over the network.
445 - SMB
44
A standard tcp/ip ports that is used to communicate directory information from servers to clients.
389 - LDAP
45
An attack with the goal of gaining access to a target system through the use of a falsified identity.
Spoofing
46
it can be used against IP addresses, MAC address, usernames, system names, wireless network SSIDs, email addresses, and many other types of logical identification.
spoofing
47
An attack that attempts to misdirect legitimate users to malicious websites through the abuse of URLs or hyperlinks in emails could be considered phishing.
phishing
48
is a network resource consumption attack that has the primary goal of preventing legitimate activity on a victimized system.
DOS/DDOS
49
is perhaps the earliest form of malicious code to plague security administrators.
Computer virus
50
it is a self-replicating piece of code that spreads without the consent of a user, but frequently with their assistance (a user has to click on a link or open a file).
virus
51
it pose a significant risk to network security. They contain the same destructive potential as other malicious code objects with an added twist—they propagate themselves without requiring any human intervention.
worms
52
is a software program that appears benevolent but carries a malicious, behind-the-scenes payload that has the potential to wreak havoc on a system or network.
trojan
53
attackers place themselves between two devices, often between a web browser and a web server, to intercept or modify information that is intended for one or both of the endpoints.
on path-attack
54
it is also known as main-in-the-middle (MITM) attacks.
on path-attack
55
it is a passive, noninvasive attack to observe the operation of a device
side-channel
56
refers to threats that demonstrate an unusually high level of technical and operational sophistication spanning months or even years. APT attacks are often conducted by highly organized groups of attackers.
Advanced persistent threat (APT)
57
are threats that arise from individuals who are trusted by the organization.
insider threats
58
A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity or availability of the victim’s data, applications or operating system or otherwise annoying or disrupting the victim.
malware
59
often use cryptography to “lock” the files on an affected computer and require the payment of a ransom fee in return for the “unlock” code.
ransomware
60
it automates the inspection of logs and real-time system events to detect intrusion attempts and system failures.
intrusion detection system (IDS)
61
it monitors activity on a single computer, including process calls and information recorded in system, application, security and host-based firewall logs.
Host-based Intrusion Detection System (HIDS)
62
it monitors and evaluates network activity to detect attacks or event anomalies.
Network Intrusion Detection System (NIDS)
63
it is usually able to detect the initiation of an attack or ongoing attacks, but they can’t always provide information about the success of an attack.
Network Intrusion Detection System (NIDS)
64
involves the use of tools that collect information about the IT environment from many disparate sources to better examine the overall security of the organization and streamline security efforts.
security management
65
is usually associated with an internet-based set of computing resources, and typically sold as a service, provided by a cloud service provider (CSP).
Cloud computing
66
enumerate the service models (3)
1. software as a service (saas) 2. platform as a service (paas) 3. infrastructure as a service (iaas)
67
A cloud provides access to software applications such as email or office productivity tools.
Software as a Service (SaaS)
68
it is a distributed model where software applications are hosted by a vendor or cloud service provider and made available to customers over network resources.
Software as a Service (SaaS)
69
A cloud provides an environment for customers to use to build and operate their own software.
Platform as a Service (PaaS)
70
is a way for customers to rent hardware, operating systems, storage and network capacity over the internet from a cloud service provider.
Platform as a Service
71
A cloud provides network access to traditional computing resources such as processing power and storage. IaaS models provide basic computing resources to consumers. This includes servers, storage, and in some cases, networking resources.
Infrastructure as a Service (IaaS)
72
Enumerate the 4 deployment models
1. public 2. private 3. hybrid 4. community
73
is a company that manages information technology assets for another company.
managed service provider (MSP)
74
is an agreement between a cloud service provider and a cloud service customer based on a taxonomy of cloud computing– specific terms to set the quality of the cloud services delivered.
cloud computing service-level agreement (cloud sla)
75
it involves controlling traffic among networked devices.
network segmentation
76
it is a network area that is designed to be accessed by outside visitors but is still isolated from the private network of the organization
DMZ
77
they are created by switches to logically segment a network without altering its physical topolgy.
VLANs
78
is a communication tunnel that provides point to point transmission of both authentication and data traffic over an untrusted network.
virtual private network (vpn)
79
it uses multiple types of access controls in literal or theoretical layers to help an organization avoid a monolithic security stance
defense in depth
80
is a concept of controlling access to an environment through strict adherence to and implementation of security policy
network access control (nac)
81
are often micro segmented networks, with firewalls at nearly every connecting point.
zero trust network
82
encapsulates information assets, the services that apply to them and their security properties.
Zero trust
83
is a computer implemented as part of a larger system.
embedded system
84
is typically designed around a limited set of specific functions in relation to the larger product of which it is a component.
embedded system
85
is the collection of devices that can communicate over the internet with one another or with a control console in order to affect and monitor the real world.
Internet of Things (IoT)
86
The toolsets of current adversaries are polymorphic in nature and allow threats to bypass static security controls.
Microsegmentation
87
allow network administrators to use switches to create software-based LAN segments, which can segregate or consolidate traffic across multiple switch ports.
Virtual local area networks (VLANs)