Bash, the Crucial Exams Chat Bot
AI Bot
Network Security Fundamentals Flashcards
Front | Back |
How does a man-in-the-middle attack operate | It intercepts and potentially alters communication between two parties |
What does MFA stand for | Multi-Factor Authentication |
What does SSL/TLS protect | Data in transit across the network |
What does the principle of least privilege suggest | Users and systems should only have access necessary for their tasks |
What does the term phishing refer to | A cyber attack where users are tricked into revealing sensitive information |
What does VPN stand for | Virtual Private Network |
What is a botnet | A network of infected devices controlled remotely by an attacker |
What is a zero-day vulnerability | A security flaw that is exploited before it is publicly known |
What is ARP spoofing | An attack where a malicious actor sends falsified ARP messages to associate their MAC address with the IP address of another device |
What is port scanning used for | To identify open ports and services running on a network |
What is the function of an Intrusion Detection System (IDS) | To monitor network traffic for suspicious activity and alert administrators |
What is the primary difference between symmetric and asymmetric encryption | Symmetric uses one key while asymmetric uses a public and private key pair |
What is the primary purpose of a firewall | To monitor and control incoming and outgoing network traffic based on security rules |
What is the purpose of a DMZ in a network | To isolate external-facing servers from the internal network |
What is the role of DNS in networking | To translate domain names into IP addresses |
What kind of attack aims to overwhelm a network or server with traffic | DDoS (Distributed Denial of Service) |
What tool is commonly used for network traffic analysis | Wireshark |
Which layer of the OSI model does a packet filtering firewall operate on | The Network Layer (Layer 3) |
Which protocol is used to secure web traffic | HTTPS |
Why is segmentation important for network security | It limits the spread of attacks within a network by isolating segments |
Front
What is the function of an Intrusion Detection System (IDS)
Click the card to flip
Back
To monitor network traffic for suspicious activity and alert administrators
Front
What does the principle of least privilege suggest
Back
Users and systems should only have access necessary for their tasks
Front
What is the purpose of a DMZ in a network
Back
To isolate external-facing servers from the internal network
Front
What does SSL/TLS protect
Back
Data in transit across the network
Front
What tool is commonly used for network traffic analysis
Back
Wireshark
Front
What does MFA stand for
Back
Multi-Factor Authentication
Front
Which protocol is used to secure web traffic
Back
HTTPS
Front
How does a man-in-the-middle attack operate
Back
It intercepts and potentially alters communication between two parties
Front
What is ARP spoofing
Back
An attack where a malicious actor sends falsified ARP messages to associate their MAC address with the IP address of another device
Front
What is a botnet
Back
A network of infected devices controlled remotely by an attacker
Front
What is the primary purpose of a firewall
Back
To monitor and control incoming and outgoing network traffic based on security rules
Front
What is the role of DNS in networking
Back
To translate domain names into IP addresses
Front
Why is segmentation important for network security
Back
It limits the spread of attacks within a network by isolating segments
Front
What is port scanning used for
Back
To identify open ports and services running on a network
Front
What is the primary difference between symmetric and asymmetric encryption
Back
Symmetric uses one key while asymmetric uses a public and private key pair
Front
What is a zero-day vulnerability
Back
A security flaw that is exploited before it is publicly known
Front
What kind of attack aims to overwhelm a network or server with traffic
Back
DDoS (Distributed Denial of Service)
Front
What does VPN stand for
Back
Virtual Private Network
Front
What does the term phishing refer to
Back
A cyber attack where users are tricked into revealing sensitive information
Front
Which layer of the OSI model does a packet filtering firewall operate on
Back
The Network Layer (Layer 3)
1/20
This deck explores key network security protocols, common vulnerabilities, and strategies for protecting networked environments.