Bash, the Crucial Exams Chat Bot
AI Bot

Network Security Fundamentals Flashcards

To monitor network traffic for suspicious activity and alert administrators
Wireshark
To isolate external-facing servers from the internal network
What is the purpose of a DMZ in a network
Which protocol is used to secure web traffic
What is the function of an Intrusion Detection System (IDS)
HTTPS
What is ARP spoofing
How does a man-in-the-middle attack operate
It intercepts and potentially alters communication between two parties
An attack where a malicious actor sends falsified ARP messages to associate their MAC address with the IP address of another device
What tool is commonly used for network traffic analysis
FrontBack
How does a man-in-the-middle attack operateIt intercepts and potentially alters communication between two parties
What does MFA stand forMulti-Factor Authentication
What does SSL/TLS protectData in transit across the network
What does the principle of least privilege suggestUsers and systems should only have access necessary for their tasks
What does the term phishing refer toA cyber attack where users are tricked into revealing sensitive information
What does VPN stand forVirtual Private Network
What is a botnetA network of infected devices controlled remotely by an attacker
What is a zero-day vulnerabilityA security flaw that is exploited before it is publicly known
What is ARP spoofingAn attack where a malicious actor sends falsified ARP messages to associate their MAC address with the IP address of another device
What is port scanning used forTo identify open ports and services running on a network
What is the function of an Intrusion Detection System (IDS)To monitor network traffic for suspicious activity and alert administrators
What is the primary difference between symmetric and asymmetric encryptionSymmetric uses one key while asymmetric uses a public and private key pair
What is the primary purpose of a firewallTo monitor and control incoming and outgoing network traffic based on security rules
What is the purpose of a DMZ in a networkTo isolate external-facing servers from the internal network
What is the role of DNS in networkingTo translate domain names into IP addresses
What kind of attack aims to overwhelm a network or server with trafficDDoS (Distributed Denial of Service)
What tool is commonly used for network traffic analysisWireshark
Which layer of the OSI model does a packet filtering firewall operate onThe Network Layer (Layer 3)
Which protocol is used to secure web trafficHTTPS
Why is segmentation important for network securityIt limits the spread of attacks within a network by isolating segments
Front
What does the term phishing refer to
Click the card to flip
Back
A cyber attack where users are tricked into revealing sensitive information
Front
Which layer of the OSI model does a packet filtering firewall operate on
Back
The Network Layer (Layer 3)
Front
What does MFA stand for
Back
Multi-Factor Authentication
Front
Which protocol is used to secure web traffic
Back
HTTPS
Front
Why is segmentation important for network security
Back
It limits the spread of attacks within a network by isolating segments
Front
What does SSL/TLS protect
Back
Data in transit across the network
Front
What is the purpose of a DMZ in a network
Back
To isolate external-facing servers from the internal network
Front
What is the function of an Intrusion Detection System (IDS)
Back
To monitor network traffic for suspicious activity and alert administrators
Front
What does the principle of least privilege suggest
Back
Users and systems should only have access necessary for their tasks
Front
What kind of attack aims to overwhelm a network or server with traffic
Back
DDoS (Distributed Denial of Service)
Front
What is port scanning used for
Back
To identify open ports and services running on a network
Front
How does a man-in-the-middle attack operate
Back
It intercepts and potentially alters communication between two parties
Front
What is the primary difference between symmetric and asymmetric encryption
Back
Symmetric uses one key while asymmetric uses a public and private key pair
Front
What does VPN stand for
Back
Virtual Private Network
Front
What is a botnet
Back
A network of infected devices controlled remotely by an attacker
Front
What is a zero-day vulnerability
Back
A security flaw that is exploited before it is publicly known
Front
What is the role of DNS in networking
Back
To translate domain names into IP addresses
Front
What is the primary purpose of a firewall
Back
To monitor and control incoming and outgoing network traffic based on security rules
Front
What tool is commonly used for network traffic analysis
Back
Wireshark
Front
What is ARP spoofing
Back
An attack where a malicious actor sends falsified ARP messages to associate their MAC address with the IP address of another device
1/20
This deck explores key network security protocols, common vulnerabilities, and strategies for protecting networked environments.
Share on...
Follow us on...