Domain 4: Network Security Flashcards

(84 cards)

1
Q

What is a common network device used to connect networks?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a common network device used to filter traffic?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What connects all devices behind the firewall in a small business network?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a potential drawback associated with the freedom provided by wireless networking?

-Additional vulnerabilities
-Enhanced physical access control
-Limited signal range
-Reduced deployment cost

A

Additional vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does micro-segmentation aid in protecting against?

A

Advanced persistent threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following tools can be used to both identify and prevent threats? Select three options
-Anti-malware/antivirus
-Firewalls
-Intrusion Protection System (IPS)
-SIEM

A

Anti-malware/antivirus
Firewalls
Intrusion Protection System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does microsegmentation enforce in terms of business functions/units/offices/departments?

A

The concept of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term describes a portion of the organization’s network that interfaces directly with the outside world and typically has more security controls and restrictions compared to the rest of the internal IT environment?

A

Demilitarized zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a potential alternative to expensive dedicated point-to-point connections?

A

Gateway-to-gateway VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a Web Application Firewall (WAF) function in a network?

A

It monitors all traffic from the outside for malicious behavior before passing commands to a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary purpose of Virtual Local Area Networks (VLANs)?

A

Consolidate traffic across multiple switch ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following tools can be used to grant remote users access to the internal IT environment?

A

VPN (virtual private network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of transfer switches or transformers in a redundant power system?

A

Enable seamless transition between power sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In a scenario requiring full redundancy, what should devices have in terms of power supplies?

A

Two power supplies connected to diverse sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is an abnormal system shutdown in a data center a concern?

A

It may result in the loss or corruption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is network monitoring or sniffing?

A

Monitoring traffic patterns to obtain information about a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of the three-way handshake in networking?

A

Synchronizing and acknowledging requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are well-known ports (0-1023) associated with?

A

Common protocols at the core of TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is resource pooling in the context of cloud computing?

A

Sharing physical servers with other organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a cloud arrangement in which the provider owns and manages the hardware, operating system, and applications in the cloud, while the customer retains ownership of the data?

A

Software as a service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is one of the services offered by many MSPs, where they monitor firewalls and other security tools to provide expertise in triaging events?

A

Managed Detection and Response (MDR) Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which cloud computing model allows an enterprise to scale up new software or data-based services/solutions quickly without massive hardware installation?

A

Infrastructure as a Service (IaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which organization’s definition of cloud computing is commonly used globally?

A

National Institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the main purpose of a Service Level Agreement (SLA)?

A

To document specific parameters and minimum service levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What distinguishes Memoranda of Understanding (MOU) or Memoranda of Agreement (MOA) from Service Level Agreements (SLA)?
MOUs/MOAs are more directly related to what can be done with a system or information, while SLAs specify more intricate aspects of services
26
What might a user typically need to acknowledge before being allowed to access the internet in a hotel network?
Acceptable use policy
27
How are VLANs used in Network Access Control (NAC) systems?
VLANs control whether devices connect to the corporate network or a guest network
28
What is the primary responsibility of the upper layer (host or application layer) in a network model?
Managing the integrity of a connection, controlling the session, and transforming data into a format that any system can understand
29
Which layer of the OSI model corresponds to the Internet Layer in the TCP/IP protocol architecture?
Network Layer
30
What protocol is often used by embedded systems when connected to a corporate network?
TCP/IP
31
What information would be removed from a threat alert to maintain anonymity?
Host name and username
32
What is the common term used to describe the mechanisms that control the temperature and humidity in a data center?
HVAC (heating, ventilation and air conditioning)
33
How many layers does the OSI model have?
Seven
34
What does the NAC device provide for access security and incident response?
Network visibility
35
Which cloud deployment model allows an organization to retain control of its IT environments, use public cloud services for non-mission critical workloads, and benefit from flexibility, scalability, and cost savings?
Hybrid cloud
36
How does microsegmentation in zero-trust networks enhance security?
By enforcing frequent re-authentication of user ID
37
How can logical network segmentation be imposed on embedded systems and IoT devices?
Through traffic-control means, including VLANs, MAC addresses, IP addresses, physical ports, protocols, or application filtering
38
An attack against the availability of a network/system; typically uses many attacking machines to direct traffic against a given target. What is the name of this?
Distributed-denial-of-service (DDOS)
39
What is a security solution installed on an endpoint to detect potentially anomalous activity?
Host-based intrusion prevention system
40
What is the purpose of a subnet mask in IPv4?
It defines the part of the address used for the subnet ## Footnote Allows networks to be divided into subnets.
41
Endpoint <------> Web server Which port number is associated with the protocol typically used in this connection?
80
42
Application programming interface (API)
A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or web tool.
43
Bit
The most essential representation of data (zero or one) at Layer 1 of the Open Systems Interconnection (OSI) model.
44
Broadcast
Broadcast transmission is a one-to-many (one-to-everyone) form of sending internet traffic.
45
Byte
The byte is a unit of digital information that most commonly consists of eight bits.
46
Cloud computing
A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
47
Community cloud
System where the cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy and compliance considerations). It may be owned, managed and operated by one or more of the organizations in the community,
48
De-encapsulation
The opposite process of encapsulation, in which bundles of data are unpacked or revealed.
49
Denial-of-Service (DoS)
The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours,
50
Domain Name Service (DNS)
This acronym can be applied to three interrelated elements: a service, a physical server and a network protocol.
51
Encapsulation
Enforcement of data hiding and code hiding during all phases of software development and operational use. Bundling together data and methods is the process of encapsulation; taking any set of data and packaging it or hiding it in another data structure,
52
Encryption
The process and act of converting the message from its plaintext to ciphertext.
53
File Transfer Protocol (FTP)
The internet protocol (and program) used to transfer files between hosts.
54
Fragment attack
In a fragment attack, an attacker fragments traffic in such a way that a system is unable to put data packets back together.
55
Hardware
The physical parts of a computer and related devices.
56
Hybrid cloud
A combination of public cloud storage and private cloud storage where some critical data resides in the enterprise's private cloud while other data is stored and accessible from a public cloud storage provider.
57
Infrastructure as a Service (IaaS)
The provider of the core computing, storage and network hardware and software that is the foundation upon which organizations can build and then deploy applications. ## Footnote Popular in data center where software and servers are purchased as a fully outsourced service and usually billed on usage
58
Internet Control Message Protocol (ICMP)
An IP network protocol standardized by the Internet Engineering Task Force (IETF) through RFC 792 to determine if a particular service or host is available.
59
Internet Protocol (IPv4)
Standard protocol for transmission of data from source to destinations in packet-switched communications networks and interconnected systems of such networks.
60
Man-in-the-Middle
An attack where the adversary positions himself in between the user and the system so that he can intercept and alter data traveling between.
61
Microsegmentation
Part of a zero-trust strategy that breaks LANs into very small, highly localized zones using firewalls or similar technologies. At the limit, this places firewall at every connection point.
62
Oversized Packet Attack
Purposely sending a network packet that is larger than expected or larger than can be handled by the receiving system, causing the receiving system to fail unexpectedly.
63
Packet
Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model.
64
Payload
The primary action of a malicious code attack.
65
Payment Card Industry Data Security Standard (PCI DSS)
An information security standard administered by Payment Card Industry Security Standards Council applies to services who process credit or debit card transactions.
66
Platform as a Service (PaaS)
The web-authoring or application development middleware environment that allows applications to be built in the cloud before they're deployed as SaaS assets.
67
Private cloud
The phrase used to describe a cloud computing platform that is implemented within the corporate firewall, under the control of the IT department. removes a number of objections, including control over enterprise and customer data, worries about security, and issues connected to regulatory compliance.
68
Protocols
A set of rules (formats and procedures) to implement and control some type of communication between systems.
69
Public cloud
The cloud infrastructure is provisioned for open use by the general public. It exists on the premises of the cloud provider.
70
Simple Mail Transport Protocol (SMTP)
The standard communication protocol for sending and receiving emails between senders and receivers.
71
Software
Computer programs and associated data that may be dynamically written or modified during execution.
72
Software as a Service (SaaS)
The cloud customer uses the cloud provider's applications running within a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser or a program interface.
73
Spoofing
Faking the sending address of a transmission to gain illegal entry into a secure system.
74
Transport Control Protocol/Internet Protocol (TCP/IP) Model (layers)
Internetworking protocol model created by the IETF, which specifies four layers of functionality: Link layer (physical communications), Internet Layer (network-to-network communication), Transport Layer (basic channels for connections and connectionless exchange of data between hosts) Application Layer, where other protocols and user applications programs make use of network services.
75
VLAN
A virtual local area network (VLAN) is a logical group of workstations, servers, and network devices that appear to be on the same LAN .
76
VPN
A virtual private network (VPN), built on top of existing networks, that can provide a secure communications mechanism for transmission between networks.
77
WLAN
A wireless area network (WLAN) is a group of computers and devices that are located in the same vicinity, forming a network based on radio transmissions rather than wired connections. ## Footnote Example: Wifi network
78
Zenmap
The graphical user interface (GUI) for the Nmap Security Scanner, an open-source application that scans networks to determine everything that is connected
79
Zero Trust
Removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset.
80
Application Layer of TCP/IP Architecture What does it do and protocols
Defines the protocols for the transport layer. Simple mail transfer protocol (SMTP). Hypertext transfer protocol/secure (HTTP/HTTPS). File transfer protocol (FTP). Secure shell (SSH).
81
Transport Layer of TCP/IP Architecture What does it do and protocols
Permits data to move among devices User datagram protocol (UDP). Transmission control protocol (TCP).
82
Internet Layer of TCP/IP Architecture What does it do and protocols
Creates/inserts packets. Internet protocol versions 4 and 6 (IPv4/IPv6). Internet control message protocol (ICMP). Address resolution protocol (ARP).
83
Network Interface Layer of TCP/IP Architecture What does it do?
Network Interface Layer How data moves through the network. Transmits data between applications or devices over the network.
84
A tool that inspects outbound traffic to reduce potential threats.
DLP (data loss prevention)