Bash, the Crucial Exams Chat Bot
AI Bot

Network Security Fundamentals  Flashcards

CompTIA SecurityX CAS-005 (V5) Flashcards

FrontBack
How does a man-in-the-middle attack operateIt intercepts and potentially alters communication between two parties
What does MFA stand forMulti-Factor Authentication
What does SSL/TLS protectData in transit across the network
What does the principle of least privilege suggestUsers and systems should only have access necessary for their tasks
What does the term phishing refer toA cyber attack where users are tricked into revealing sensitive information
What does VPN stand forVirtual Private Network
What is a botnetA network of infected devices controlled remotely by an attacker
What is a zero-day vulnerabilityA security flaw that is exploited before it is publicly known
What is ARP spoofingAn attack where a malicious actor sends falsified ARP messages to associate their MAC address with the IP address of another device
What is port scanning used forTo identify open ports and services running on a network
What is the function of an Intrusion Detection System (IDS)To monitor network traffic for suspicious activity and alert administrators
What is the primary difference between symmetric and asymmetric encryptionSymmetric uses one key while asymmetric uses a public and private key pair
What is the primary purpose of a firewallTo monitor and control incoming and outgoing network traffic based on security rules
What is the purpose of a DMZ in a networkTo isolate external-facing servers from the internal network
What is the role of DNS in networkingTo translate domain names into IP addresses
What kind of attack aims to overwhelm a network or server with trafficDDoS (Distributed Denial of Service)
What tool is commonly used for network traffic analysisWireshark
Which layer of the OSI model does a packet filtering firewall operate onThe Network Layer (Layer 3)
Which protocol is used to secure web trafficHTTPS
Why is segmentation important for network securityIt limits the spread of attacks within a network by isolating segments
This deck explores key network security protocols, common vulnerabilities, and strategies for protecting networked environments.
Share on...
Follow us on...