Bash, the Crucial Exams Chat Bot
AI Bot
Network Security Fundamentals Flashcards
CompTIA SecurityX CAS-005 (V5) Flashcards
| Front | Back |
| How does a man-in-the-middle attack operate | It intercepts and potentially alters communication between two parties |
| What does MFA stand for | Multi-Factor Authentication |
| What does SSL/TLS protect | Data in transit across the network |
| What does the principle of least privilege suggest | Users and systems should only have access necessary for their tasks |
| What does the term phishing refer to | A cyber attack where users are tricked into revealing sensitive information |
| What does VPN stand for | Virtual Private Network |
| What is a botnet | A network of infected devices controlled remotely by an attacker |
| What is a zero-day vulnerability | A security flaw that is exploited before it is publicly known |
| What is ARP spoofing | An attack where a malicious actor sends falsified ARP messages to associate their MAC address with the IP address of another device |
| What is port scanning used for | To identify open ports and services running on a network |
| What is the function of an Intrusion Detection System (IDS) | To monitor network traffic for suspicious activity and alert administrators |
| What is the primary difference between symmetric and asymmetric encryption | Symmetric uses one key while asymmetric uses a public and private key pair |
| What is the primary purpose of a firewall | To monitor and control incoming and outgoing network traffic based on security rules |
| What is the purpose of a DMZ in a network | To isolate external-facing servers from the internal network |
| What is the role of DNS in networking | To translate domain names into IP addresses |
| What kind of attack aims to overwhelm a network or server with traffic | DDoS (Distributed Denial of Service) |
| What tool is commonly used for network traffic analysis | Wireshark |
| Which layer of the OSI model does a packet filtering firewall operate on | The Network Layer (Layer 3) |
| Which protocol is used to secure web traffic | HTTPS |
| Why is segmentation important for network security | It limits the spread of attacks within a network by isolating segments |
This deck explores key network security protocols, common vulnerabilities, and strategies for protecting networked environments.