🔥 40% Off Crucial Exams Memberships — This Week Only

2 days, 13 hours remaining!
Bash, the Crucial Exams Chat Bot
AI Bot

SSCP - Network and Communications Security  Flashcards

ISC2 Systems Security Certified Practitioner (SSCP) Flashcards

What is the purpose of a honeypot in network security
Explain the purpose of SSL/TLS in networking
To monitor and control incoming and outgoing network traffic based on predetermined security rules
What port does HTTPS use by default
What is the difference between stateful and stateless firewalls
To lure attackers away from actual data and study their behavior
To issue and verify digital certificates for secure communications
What is the role of a certificate authority (CA)
Port 443
Stateful firewalls track the state of connections and filter traffic based on state, while stateless firewalls filter based only on predefined rules
What is the purpose of a firewall
To provide secure communication over the internet through encryption
FrontBack
At which OSI layer does encryption typically occurPresentation layer (Layer 6)
Define port scanningThe act of systematically scanning a computer's ports to identify open ports and services
Define the term "packet sniffer"A tool used to capture and analyze network traffic
Explain the purpose of MAC filteringTo allow or restrict devices based on their MAC address at the network level
Explain the purpose of SSL/TLS in networkingTo provide secure communication over the internet through encryption
What does "OSI" in the OSI model stand forOpen Systems Interconnection
What does "spoofing" refer to in network securityFaking the identity of a device or user to gain unauthorized access to a system
What does a VPN provide during communicationIt ensures secure and encrypted communication over untrusted networks
What does SSH stand for and what is its purposeSecure Shell; it's used to securely access and manage remote systems over a network
What does the term "inactive session timeout" refer toDisconnecting users automatically after periods of inactivity to enhance security
What does the term "man-in-the-middle attack" (MITM) refer toAn attack where a third party intercepts and potentially alters communication between two parties
What does the term "media access control" refer to in networkingThe process and rules for transmitting data over a network medium
What does the term "phishing" refer toA cyber attack that uses deceptive emails or messages to steal sensitive information
What does the term "zero trust" refer toA security model where all users and devices are verified continuously without assuming trust based on location or credentials
What does the term DDoS stand forDistributed Denial of Service
What is 802.11A set of standards for implementing wireless local area network (WLAN) communication
What is a Demilitarized Zone (DMZ) in networkingAn isolated network segment used to host public-facing services while protecting the internal network
What is a subnet mask used forTo distinguish the network and host portions of an IP address
What is DHCP's primary purpose in networkingTo automatically assign IP addresses to devices on a network
What is port forwarding used forTo redirect traffic from one port on a device to a different port or device
What is the difference between an IDS and an IPSAn IDS detects threats and alerts on them, while an IPS actively blocks threats in real time
What is the difference between stateful and stateless firewallsStateful firewalls track the state of connections and filter traffic based on state, while stateless firewalls filter based only on predefined rules
What is the difference between symmetric and asymmetric encryptionSymmetric uses the same key for encryption and decryption, whereas asymmetric uses a key pair (public and private keys)
What is the difference between TCP and UDP in terms of reliabilityTCP is connection-oriented and reliable, while UDP is connectionless and does not guarantee delivery
What is the function of a load balancerTo distribute network traffic across multiple servers for improved performance and reliability
What is the function of a SIEM systemTo collect, analyze, and monitor security event data for potential threats
What is the function of the BGP protocolTo exchange routing information between different autonomous systems on the internet
What is the main difference between a switch and a hubA switch forwards traffic to specific devices, while a hub sends traffic to all connected devices
What is the primary function of a VPN concentratorTo manage and handle multiple VPN connections simultaneously
What is the primary function of an Intrusion Detection System (IDS)To monitor for and alert on malicious or suspicious activities on a network
What is the primary function of an Intrusion Prevention System (IPS)To detect and actively block threats to a network
What is the primary purpose of NAT (Network Address Translation)To allow multiple devices on a private network to share a single public IP address
What is the primary use of the ICMP protocolTo send error messages and operational information, such as in ping requests
What is the principle behind defense in depthUsing multiple layers of security to protect a system or network
What is the purpose of a firewallTo monitor and control incoming and outgoing network traffic based on predetermined security rules
What is the purpose of a honeypot in network securityTo lure attackers away from actual data and study their behavior
What is the purpose of a time-based one-time password (TOTP)To provide a temporary and unique passcode for authentication, typically used in two-factor authentication
What is the purpose of a VLAN in a networkTo create logically segmented networks within a physical network infrastructure
What is the purpose of network segmentationTo divide a network into smaller segments to limit the spread of an attack or isolate sensitive resources
What is the purpose of the ARP protocolTo map an IP address to a device's physical MAC address within a local network
What is the purpose of wireless encryption protocols such as WPA2To ensure secure communication over wireless networks by encrypting data
What is the role of a certificate authority (CA)To issue and verify digital certificates for secure communications
What is the role of a proxy server in a networkTo act as an intermediary between clients and servers, offering caching and filtering
What is the role of DNS in networkingTo translate human-readable domain names into IP addresses
What is the term for disguising malicious network traffic as legitimate trafficTunneling
What port does HTTP use by defaultPort 80
What port does HTTPS use by defaultPort 443
What protocol ensures secure browsing over the internetHTTPS (Hypertext Transfer Protocol Secure)
What protocol is typically used for email encryptionSecure/Multipurpose Internet Mail Extensions (S/MIME) or Pretty Good Privacy (PGP)
What security principle does "Least Privilege" refer toGranting users and systems the minimum access necessary to perform tasks
Front
What is the difference between symmetric and asymmetric encryption
Click the card to flip
Back
Symmetric uses the same key for encryption and decryption, whereas asymmetric uses a key pair (public and private keys)
Front
What security principle does "Least Privilege" refer to
Back
Granting users and systems the minimum access necessary to perform tasks
Front
What is the primary function of an Intrusion Prevention System (IPS)
Back
To detect and actively block threats to a network
Front
What does the term "zero trust" refer to
Back
A security model where all users and devices are verified continuously without assuming trust based on location or credentials
Front
What is the primary function of a VPN concentrator
Back
To manage and handle multiple VPN connections simultaneously
Front
What is the function of a load balancer
Back
To distribute network traffic across multiple servers for improved performance and reliability
Front
What does "spoofing" refer to in network security
Back
Faking the identity of a device or user to gain unauthorized access to a system
Front
What is the difference between TCP and UDP in terms of reliability
Back
TCP is connection-oriented and reliable, while UDP is connectionless and does not guarantee delivery
Front
What port does HTTPS use by default
Back
Port 443
Front
What does SSH stand for and what is its purpose
Back
Secure Shell; it's used to securely access and manage remote systems over a network
Front
What is the role of a proxy server in a network
Back
To act as an intermediary between clients and servers, offering caching and filtering
Front
What is the difference between stateful and stateless firewalls
Back
Stateful firewalls track the state of connections and filter traffic based on state, while stateless firewalls filter based only on predefined rules
Front
What protocol ensures secure browsing over the internet
Back
HTTPS (Hypertext Transfer Protocol Secure)
Front
What does a VPN provide during communication
Back
It ensures secure and encrypted communication over untrusted networks
Front
What does "OSI" in the OSI model stand for
Back
Open Systems Interconnection
Front
What is the primary purpose of NAT (Network Address Translation)
Back
To allow multiple devices on a private network to share a single public IP address
Front
What is a subnet mask used for
Back
To distinguish the network and host portions of an IP address
Front
What is the principle behind defense in depth
Back
Using multiple layers of security to protect a system or network
Front
Define port scanning
Back
The act of systematically scanning a computer's ports to identify open ports and services
Front
Define the term "packet sniffer"
Back
A tool used to capture and analyze network traffic
Front
What is the purpose of a VLAN in a network
Back
To create logically segmented networks within a physical network infrastructure
Front
What is the purpose of wireless encryption protocols such as WPA2
Back
To ensure secure communication over wireless networks by encrypting data
Front
Explain the purpose of SSL/TLS in networking
Back
To provide secure communication over the internet through encryption
Front
What does the term "man-in-the-middle attack" (MITM) refer to
Back
An attack where a third party intercepts and potentially alters communication between two parties
Front
What is the purpose of the ARP protocol
Back
To map an IP address to a device's physical MAC address within a local network
Front
What does the term "media access control" refer to in networking
Back
The process and rules for transmitting data over a network medium
Front
What is the role of a certificate authority (CA)
Back
To issue and verify digital certificates for secure communications
Front
What is the difference between an IDS and an IPS
Back
An IDS detects threats and alerts on them, while an IPS actively blocks threats in real time
Front
What is the role of DNS in networking
Back
To translate human-readable domain names into IP addresses
Front
Explain the purpose of MAC filtering
Back
To allow or restrict devices based on their MAC address at the network level
Front
What is the purpose of network segmentation
Back
To divide a network into smaller segments to limit the spread of an attack or isolate sensitive resources
Front
What is the purpose of a time-based one-time password (TOTP)
Back
To provide a temporary and unique passcode for authentication, typically used in two-factor authentication
Front
What is the function of a SIEM system
Back
To collect, analyze, and monitor security event data for potential threats
Front
What is the primary use of the ICMP protocol
Back
To send error messages and operational information, such as in ping requests
Front
What is the purpose of a firewall
Back
To monitor and control incoming and outgoing network traffic based on predetermined security rules
Front
What is 802.11
Back
A set of standards for implementing wireless local area network (WLAN) communication
Front
What is the main difference between a switch and a hub
Back
A switch forwards traffic to specific devices, while a hub sends traffic to all connected devices
Front
What does the term "inactive session timeout" refer to
Back
Disconnecting users automatically after periods of inactivity to enhance security
Front
What protocol is typically used for email encryption
Back
Secure/Multipurpose Internet Mail Extensions (S/MIME) or Pretty Good Privacy (PGP)
Front
What does the term "phishing" refer to
Back
A cyber attack that uses deceptive emails or messages to steal sensitive information
Front
What port does HTTP use by default
Back
Port 80
Front
What does the term DDoS stand for
Back
Distributed Denial of Service
Front
At which OSI layer does encryption typically occur
Back
Presentation layer (Layer 6)
Front
What is the function of the BGP protocol
Back
To exchange routing information between different autonomous systems on the internet
Front
What is DHCP's primary purpose in networking
Back
To automatically assign IP addresses to devices on a network
Front
What is the purpose of a honeypot in network security
Back
To lure attackers away from actual data and study their behavior
Front
What is the term for disguising malicious network traffic as legitimate traffic
Back
Tunneling
Front
What is the primary function of an Intrusion Detection System (IDS)
Back
To monitor for and alert on malicious or suspicious activities on a network
Front
What is a Demilitarized Zone (DMZ) in networking
Back
An isolated network segment used to host public-facing services while protecting the internal network
Front
What is port forwarding used for
Back
To redirect traffic from one port on a device to a different port or device
1/50
This deck covers the fundamentals of network security, including secure communication protocols, network traffic analysis, and methods to protect network infrastructure.
Share on...
Follow us on...