Network Security Fundamentals Flashcards
CompTIA SecurityX CAS-005 (V5) Flashcards

| Front | Back |
| How does a man-in-the-middle attack operate | It intercepts and potentially alters communication between two parties |
| What does MFA stand for | Multi-Factor Authentication |
| What does SSL/TLS protect | Data in transit across the network |
| What does the principle of least privilege suggest | Users and systems should only have access necessary for their tasks |
| What does the term phishing refer to | A cyber attack where users are tricked into revealing sensitive information |
| What does VPN stand for | Virtual Private Network |
| What is a botnet | A network of infected devices controlled remotely by an attacker |
| What is a zero-day vulnerability | A security flaw that is exploited before it is publicly known |
| What is ARP spoofing | An attack where a malicious actor sends falsified ARP messages to associate their MAC address with the IP address of another device |
| What is port scanning used for | To identify open ports and services running on a network |
| What is the function of an Intrusion Detection System (IDS) | To monitor network traffic for suspicious activity and alert administrators |
| What is the primary difference between symmetric and asymmetric encryption | Symmetric uses one key while asymmetric uses a public and private key pair |
| What is the primary purpose of a firewall | To monitor and control incoming and outgoing network traffic based on security rules |
| What is the purpose of a DMZ in a network | To isolate external-facing servers from the internal network |
| What is the role of DNS in networking | To translate domain names into IP addresses |
| What kind of attack aims to overwhelm a network or server with traffic | DDoS (Distributed Denial of Service) |
| What tool is commonly used for network traffic analysis | Wireshark |
| Which layer of the OSI model does a packet filtering firewall operate on | The Network Layer (Layer 3) |
| Which protocol is used to secure web traffic | HTTPS |
| Why is segmentation important for network security | It limits the spread of attacks within a network by isolating segments |
About the Flashcards
Flashcards for the CompTIA SecurityX exam provide a concise way to refresh essential cybersecurity knowledge. Students can quickly review how firewalls, VPNs, IDS, and DMZs protect networks, alongside core protocols like HTTPS, SSL/TLS, and DNS that keep data moving safely.
The deck also reinforces critical security principles-least privilege, segmentation, and multi-factor authentication-while explaining common threats such as botnets, phishing, man-in-the-middle attacks, DDoS, ARP spoofing, and zero-day exploits. Practical tools and techniques, including Wireshark packet analysis and port scanning, are covered so you can connect theory to exam-ready troubleshooting scenarios. Clear definitions and comparisons, like symmetric versus asymmetric encryption, help cement important distinctions tested on the exam.
Topics covered in this flashcard deck:
- Network defense devices
- Secure communication protocols
- Encryption and authentication
- Common cyber attacks
- Traffic analysis tools