Network Security Concepts & Solutions Flashcards

Day16_Explaining Network Security Concepts (66 cards)

1
Q

What is encryption?

A

The process of converting plaintext into ciphertext using a mathematical formula

Decryption requires running the data through the formula again with the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two main parts of encryption?

A
  • Key
  • Cipher (formula)

The complexity of the formula and the length of the key determine the strength of the encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of data can be encrypted?

A
  • Data at rest (stored)
  • Data in motion (moving)

Different encryption types may be used for each type of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does authentication guarantee in encryption?

A

Authentication guarantees that the data comes from a verified source and has not been tampered with during transmission

This ensures that the data comes from a verified source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is non-repudiation in the context of encryption?

A

Non-repudiation a critical component of network security, ensuring that a party involved in a digital transaction, or communication cannot deny the authenticity of their actions

It provides undeniable proof of the origin and integrity of data, preventing individuals from disavowing their participation in a communication or transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between symmetric and asymmetric encryption?

A
  • Symmetric: Same key for encryption and decryption
  • Asymmetric: Two mathematically related keys (key pair)

Symmetric encryption is faster, while asymmetric encryption allows for secure key sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a key pair in asymmetric encryption?

A
  • Public key
  • Private key

The public key can be shared, while the private key must remain confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Identity Access Management (IAM)?

A

IAM a cybersecurity framework that ensures the right individuals and systems have the appropriate access to digital resources at the right time and for the right reasons

It governs how users are identified, authenticated, authorized, and audited within an organization’s IT environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of permissions management?

A

Permissions management determines user access to network resources

It specifies what users can view or change within the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is geofencing?

A

Geofencing the use of location-based technology, such as GPS, RFID, Wi-Fi, or cellular data to create a virtual boundary around a specific geographic location

It can use GPS, Wi-Fi, or RFID to send notifications when users enter or exit a designated area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are bollards?

A

Bollards vertical posts typically made from materials such as metal, concrete, stone, wood, or plastic designed to serve as physical and visual barriers in various environments that block entry

They are pylons that can be temporary or permanent, and are placed strategically to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an access control vestibule?

A

Access control vestibule a secured entryway with two doors, each controlled by access systems. It prevents unauthorized access and is effective in high-security situations

Think of it as a buffer zone—a space between two secure areas where access is controlled but not necessarily interlocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a mantrap?

A

Mantrap a A high-security interlock system with two interdependent doors; only one door can open at a time (interlocking mechanism)

Mantrap is like a security airlock—you must be fully authenticated and isolated before proceeding, and the system ensures only one person passes at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Common Access Card (CAC)?

A

CAC a DoD smart ID card used by military personnel, civilian employees, and eligible contractors to securely access physical facilities and DoD computer networks.

It contains personal identifiers and can be read by electronic card readers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a honeypot?

A

A virtual trap designed to attract hackers

It helps understand hacker behaviors and techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between a honeypot and a honeynet?

A
  • Honeypot: A single system designed to attract attackers
  • Honeynet: A collection of honeypots that simulate a legitimate network

Honeynets are used to gather more comprehensive data on attacker behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the CIA triad in network security?

A
  • Confidentiality
  • Integrity
  • Availability

These are the core principles of information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is risk in the context of information systems?

A

Risk is the potential for loss or damage when a threat exploits a vulnerability in a system,

It relates to compromising the confidentiality, integrity, or availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What factors determine the level of risk associated with an asset?

A

Risk level determined by:

  • Impact of losing the asset and how it affects business continuity
  • Likelihood of an adverse event occurring

If losing the asset has little effect, the risk is low; if it is vital, the risk is high.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An exploit is defined as what?

A

Exploit method of taking advantage of a vulnerability

Exploits can be apps or snippets of code designed to perform malicious acts on a vulnerable system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are two ways exploits can compromise systems?

A
  • Vulnerabilities in operating systems and applications
  • Misconfigured network devices

Every operating system or application has some sort of vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a zero-day exploit?

A

Zero-day exploit a cyberattack that targets a previously unknown software vulnerability—one that the vendor hasn’t had time to patch or even discover

These types of attacks are rare but can be complex and difficult to mitigate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is social engineering in the context of network security?

A

Social engineering is using human behavior against individuals to compromise a system

Training is vital to protect the network from social engineering attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does a threat refer to in information security?

A

An event that threatens to do harm

Harm can include unauthorized access, disruption, or damage to IT infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does being **compliant** mean in the context of data security?
**Compliant** is adhering to standards created by industry and using best practices ## Footnote Compliance protects user data and ensures a reliable IT infrastructure.
26
What is the purpose of a **compliance audit**?
**Compliant audit** evaluates whether an organization is adhering to external regulations, internal policies, and industry standards—ensuring legal, ethical, and operational accountability ## Footnote Compliance audits compare operations and practices to industry and regulatory requirements.
27
What is the **Payment Card Industry Data Security Standard (PCI DSS)**?
**PCI DSS** a set of guidelines for creating a secure environment for processing, storage, and transmission of payment card information ## Footnote It addresses vulnerabilities in data security related to customer credit information.
28
What is the primary importance of **network segmentation**?
**Network segmentation** prevents traffic from one data stream interfering with traffic from another data stream ## Footnote This is crucial for maintaining a secure and responsive network infrastructure.
29
How can devices be assigned networks in **network segmentation**?
Devices are assigned to networks: * According to predefined criteria * By controlling communications between networks ## Footnote For example, guest devices may be restricted from accessing corporate traffic.
30
What are the two ways to separate networks?
* Physically * Logically ## Footnote Physical separation involves separate wires and devices, while logical separation can use VLANs.
31
What is **micro segmentation**?
**Micro segmentation** further isolates traffic from specific devices or applications ## Footnote It examines traffic based on application layer information.
32
True or false: **Micro segmentation** allows all traffic to travel outside its connection.
FALSE ## Footnote Micro segmentation creates a completely private channel for specific traffic.
33
What is a key advantage of **network segmentation**?
*Network segmentation improves security* ## Footnote If a device is compromised, it cannot affect other devices on separate networks.
34
What is the purpose of **network access control (NAC)**?
**NAC** enforces security policies by controlling which users and devices can access a network, ensuring that only authenticated, authorized, and compliant endpoints are allowed in ## Footnote It includes concepts like port security, 802.1X, and MAC filtering.
35
What is **port security**?
**Port security** a Layer 2 security feature implemented on switch ports to control access by filtering incoming frames/ingress traffic based on the MAC addresses of connected devices ## Footnote It helps prevent unauthorized access to the network.
36
What does **802.1X** do?
Authenticates a user or system before allowing access to network resources ## Footnote It is commonly used for wireless connections.
37
What is a **Human Machine Interface**?
A simple interface for controlling devices like Programmable Logic Controllers ## Footnote It allows users to send commands and receive telemetry.
38
What is the role of **device hardening techniques**?
To secure devices by changing default settings and disabling unused ports and services ## Footnote Examples include changing default passwords and closing open ports.
39
What is the recommended method for creating a secure connection in Linux?
Using **SSH** connections ## Footnote SSH provides an encrypted connection, unlike Telnet.
40
What is the importance of **documenting configurations**?
Documenting configurations is essential for maintaining a reliable, consistent, and secure IT environment ## Footnote It ensures that all system components—such as hardware, software, network settings, and dependencies—are accurately recorded, enabling teams to reproduce, troubleshoot, and manage systems effectively across different environments
41
What is the purpose of **MAC filtering** in network security?
To restrict network access based on allowed MAC addresses ## Footnote MAC filtering can be fooled by tools that spoof allowed MAC addresses.
42
Which **WPA protocol** is recommended for wireless clients when implementing MAC filtering?
WPA3 ## Footnote WPA protocols provide extra protection and encryption to help prevent MAC spoofing.
43
Name some additional security strategies that should be combined with **MAC filtering**.
* VPNs * Antivirus * Firewalls ## Footnote These are part of a complete, secure network access solution.
44
What is **URL filtering**?
**URL filtering** a security technique that controls access to websites based on their URLs, allowing or blocking requests according to predefined rules. ## Footnote URL filtering helps manage web access and protect users from harmful sites.
45
What is **content filtering**?
**Content filtering** a security technique used to monitor, restrict, or block access to specific types of digital content based on predefined rules ## Footnote Content filtering is often built into firewalls and is essential for network security.
46
What is the main focus of the **Key Management Concepts**?
The main focus is to recognize how key management ensures the security of cryptographic keys ## Footnote Cryptographic keys are vital for encryption, decryption, and user authentication.
47
True or false: **Encryption keys** are not crucial for an organization's security.
FALSE ## Footnote Compromised encryption keys can allow unauthorized access to sensitive information.
48
What is a significant drawback of **asymmetric encryption**?
A drawback is that it's processor intensive and slower than symmetric ## Footnote Asymmetric encryption involves more complex computations.
49
What is the role of the **private key** in asymmetric encryption?
**Private key** in *asymmetric encryption* the private key plays the critical role of securely decrypting data and generating digital signatures ## Footnote The private key is essential for decrypting messages encrypted with the public key.
50
What is the purpose of **key rotation**?
Key rotation periodically changes keys to protect against compromise ## Footnote Old data is decrypted with the old key and re-encrypted with the new key.
51
What happens to data encrypted with a **revoked key**?
The data can never be accessed ## Footnote Revoked keys must be tracked to prevent accidental use.
52
What is the concept of **separation of duties** in key management?
The concept has different individuals responsible for different steps in the key management process ## Footnote This reduces the risk of a single point of failure or compromise.
53
What is **Trusted Platform Module** (TPM)?
**TPM** a specialized hardware chip or embedded module that provides secure cryptographic functions to protect sensitive data, ensure system integrity, and enable trusted computing
54
What is a **Hardware Security Module** (HSM)?
**HSM** a physical computing device designed to safeguard and manage cryptographic keys and perform cryptographic operations, such as encryption, decryption, digital signing, and authentication ## Footnote HSMs provide a high level of security for key management.
55
What is the **Principle of Least Privilege** in key management?
**PoLP** ensures a users' access to keys should be limited to only what is necessary for them to perform their work ## Footnote This principle helps minimize potential security breaches.
56
What is part of a **comprehensive network security plan**?
* Controlling access to data at rest * Controlling access to network resources * Implementing network security rules ## Footnote These elements are essential for protecting network integrity and data security.
57
What do **access control lists** (ACLs) do?
**ACLs** rule-based filters used in networking and operating systems to control the flow of traffic or access to resources based on defined criteria such as IP addresses, protocols, ports, or user identities. ## Footnote ACLs are crucial for managing user permissions and network traffic.
58
Where are **Network ACLs** located?
**Network ACLs** are typically located at key points **within a network infrastructure** to manage and filter traffic ## Footnote They are commonly placed on edge routers that border the public internet, acting as a first line of defense by filtering traffic before it reaches internal networks
59
True or false: **Access control lists** can prevent unwanted users from accessing resources.
TRUE ## Footnote ACLs are designed to restrict access based on defined rules.
60
What are the two types of **access control lists (ACLs)?**
* **Filesystem** ACLs * **Network** ACLs ## Footnote Each type serves different purposes in managing access to resources.
61
Where are **Filesystem ACLs** located?
**Filesystem ACLs** are located on storage devices, such as file servers or database servers ## Footnote They determine user access levels to stored data.
62
What is the role of a **tripled-homed firewall**?
**Tripled-homed firewall** uses a single firewall with *three network interfaces* to isolate and control traffic between the **internet**, a **DMZ**, and an **internal network**. ## Footnote It enhances security by controlling traffic flow between trusted, DMZ, and untrusted networks.
63
What are some common types of **filters?**
* DNS filters * Proxy filters * Email filters * Search engine filters * Internet and web filters ## Footnote Each type serves to manage and control different aspects of network traffic.
64
What is a **security zone**?
**Security zone** a network where users and devices share a common security stance ## Footnote Security zones help protect corporate networks while allowing external access.
65
What are the **three typical zones** in a network configuration?
* Trusted network * Untrusted network * Demilitarized Zone (DMZ) ## Footnote These zones help isolate and manage traffic between different network segments.
66
What is a **Bastion host**?
A public-facing server located in the DMZ ## Footnote Bastion hosts accept incoming connections and help protect the internal network.