Bash, the Crucial Exams Chat Bot
AI Bot
SSCP - Network and Communications Security Flashcards
ISC2 Systems Security Certified Practitioner (SSCP) Flashcards
| Front | Back |
| At which OSI layer does encryption typically occur | Presentation layer (Layer 6) |
| Define port scanning | The act of systematically scanning a computer's ports to identify open ports and services |
| Define the term "packet sniffer" | A tool used to capture and analyze network traffic |
| Explain the purpose of MAC filtering | To allow or restrict devices based on their MAC address at the network level |
| Explain the purpose of SSL/TLS in networking | To provide secure communication over the internet through encryption |
| What does "OSI" in the OSI model stand for | Open Systems Interconnection |
| What does "spoofing" refer to in network security | Faking the identity of a device or user to gain unauthorized access to a system |
| What does a VPN provide during communication | It ensures secure and encrypted communication over untrusted networks |
| What does SSH stand for and what is its purpose | Secure Shell; it's used to securely access and manage remote systems over a network |
| What does the term "inactive session timeout" refer to | Disconnecting users automatically after periods of inactivity to enhance security |
| What does the term "man-in-the-middle attack" (MITM) refer to | An attack where a third party intercepts and potentially alters communication between two parties |
| What does the term "media access control" refer to in networking | The process and rules for transmitting data over a network medium |
| What does the term "phishing" refer to | A cyber attack that uses deceptive emails or messages to steal sensitive information |
| What does the term "zero trust" refer to | A security model where all users and devices are verified continuously without assuming trust based on location or credentials |
| What does the term DDoS stand for | Distributed Denial of Service |
| What is 802.11 | A set of standards for implementing wireless local area network (WLAN) communication |
| What is a Demilitarized Zone (DMZ) in networking | An isolated network segment used to host public-facing services while protecting the internal network |
| What is a subnet mask used for | To distinguish the network and host portions of an IP address |
| What is DHCP's primary purpose in networking | To automatically assign IP addresses to devices on a network |
| What is port forwarding used for | To redirect traffic from one port on a device to a different port or device |
| What is the difference between an IDS and an IPS | An IDS detects threats and alerts on them, while an IPS actively blocks threats in real time |
| What is the difference between stateful and stateless firewalls | Stateful firewalls track the state of connections and filter traffic based on state, while stateless firewalls filter based only on predefined rules |
| What is the difference between symmetric and asymmetric encryption | Symmetric uses the same key for encryption and decryption, whereas asymmetric uses a key pair (public and private keys) |
| What is the difference between TCP and UDP in terms of reliability | TCP is connection-oriented and reliable, while UDP is connectionless and does not guarantee delivery |
| What is the function of a load balancer | To distribute network traffic across multiple servers for improved performance and reliability |
| What is the function of a SIEM system | To collect, analyze, and monitor security event data for potential threats |
| What is the function of the BGP protocol | To exchange routing information between different autonomous systems on the internet |
| What is the main difference between a switch and a hub | A switch forwards traffic to specific devices, while a hub sends traffic to all connected devices |
| What is the primary function of a VPN concentrator | To manage and handle multiple VPN connections simultaneously |
| What is the primary function of an Intrusion Detection System (IDS) | To monitor for and alert on malicious or suspicious activities on a network |
| What is the primary function of an Intrusion Prevention System (IPS) | To detect and actively block threats to a network |
| What is the primary purpose of NAT (Network Address Translation) | To allow multiple devices on a private network to share a single public IP address |
| What is the primary use of the ICMP protocol | To send error messages and operational information, such as in ping requests |
| What is the principle behind defense in depth | Using multiple layers of security to protect a system or network |
| What is the purpose of a firewall | To monitor and control incoming and outgoing network traffic based on predetermined security rules |
| What is the purpose of a honeypot in network security | To lure attackers away from actual data and study their behavior |
| What is the purpose of a time-based one-time password (TOTP) | To provide a temporary and unique passcode for authentication, typically used in two-factor authentication |
| What is the purpose of a VLAN in a network | To create logically segmented networks within a physical network infrastructure |
| What is the purpose of network segmentation | To divide a network into smaller segments to limit the spread of an attack or isolate sensitive resources |
| What is the purpose of the ARP protocol | To map an IP address to a device's physical MAC address within a local network |
| What is the purpose of wireless encryption protocols such as WPA2 | To ensure secure communication over wireless networks by encrypting data |
| What is the role of a certificate authority (CA) | To issue and verify digital certificates for secure communications |
| What is the role of a proxy server in a network | To act as an intermediary between clients and servers, offering caching and filtering |
| What is the role of DNS in networking | To translate human-readable domain names into IP addresses |
| What is the term for disguising malicious network traffic as legitimate traffic | Tunneling |
| What port does HTTP use by default | Port 80 |
| What port does HTTPS use by default | Port 443 |
| What protocol ensures secure browsing over the internet | HTTPS (Hypertext Transfer Protocol Secure) |
| What protocol is typically used for email encryption | Secure/Multipurpose Internet Mail Extensions (S/MIME) or Pretty Good Privacy (PGP) |
| What security principle does "Least Privilege" refer to | Granting users and systems the minimum access necessary to perform tasks |
Front
What is a Demilitarized Zone (DMZ) in networking
Click the card to flip
Back
An isolated network segment used to host public-facing services while protecting the internal network
Front
What is the primary function of a VPN concentrator
Back
To manage and handle multiple VPN connections simultaneously
Front
What does the term "zero trust" refer to
Back
A security model where all users and devices are verified continuously without assuming trust based on location or credentials
Front
What is the function of a load balancer
Back
To distribute network traffic across multiple servers for improved performance and reliability
Front
What is a subnet mask used for
Back
To distinguish the network and host portions of an IP address
Front
What is the primary function of an Intrusion Detection System (IDS)
Back
To monitor for and alert on malicious or suspicious activities on a network
Front
What port does HTTP use by default
Back
Port 80
Front
What is the role of DNS in networking
Back
To translate human-readable domain names into IP addresses
Front
What does a VPN provide during communication
Back
It ensures secure and encrypted communication over untrusted networks
Front
What is DHCP's primary purpose in networking
Back
To automatically assign IP addresses to devices on a network
Front
What is the primary use of the ICMP protocol
Back
To send error messages and operational information, such as in ping requests
Front
What is the purpose of a honeypot in network security
Back
To lure attackers away from actual data and study their behavior
Front
What protocol ensures secure browsing over the internet
Back
HTTPS (Hypertext Transfer Protocol Secure)
Front
At which OSI layer does encryption typically occur
Back
Presentation layer (Layer 6)
Front
What is the role of a certificate authority (CA)
Back
To issue and verify digital certificates for secure communications
Front
What is the primary purpose of NAT (Network Address Translation)
Back
To allow multiple devices on a private network to share a single public IP address
Front
What is the primary function of an Intrusion Prevention System (IPS)
Back
To detect and actively block threats to a network
Front
What is the function of the BGP protocol
Back
To exchange routing information between different autonomous systems on the internet
Front
What does the term "man-in-the-middle attack" (MITM) refer to
Back
An attack where a third party intercepts and potentially alters communication between two parties
Front
What is the function of a SIEM system
Back
To collect, analyze, and monitor security event data for potential threats
Front
Explain the purpose of MAC filtering
Back
To allow or restrict devices based on their MAC address at the network level
Front
What is the role of a proxy server in a network
Back
To act as an intermediary between clients and servers, offering caching and filtering
Front
What does the term DDoS stand for
Back
Distributed Denial of Service
Front
What is the difference between stateful and stateless firewalls
Back
Stateful firewalls track the state of connections and filter traffic based on state, while stateless firewalls filter based only on predefined rules
Front
What does the term "phishing" refer to
Back
A cyber attack that uses deceptive emails or messages to steal sensitive information
Front
What is the purpose of the ARP protocol
Back
To map an IP address to a device's physical MAC address within a local network
Front
What is the purpose of network segmentation
Back
To divide a network into smaller segments to limit the spread of an attack or isolate sensitive resources
Front
What is the main difference between a switch and a hub
Back
A switch forwards traffic to specific devices, while a hub sends traffic to all connected devices
Front
What is 802.11
Back
A set of standards for implementing wireless local area network (WLAN) communication
Front
What is the principle behind defense in depth
Back
Using multiple layers of security to protect a system or network
Front
What does SSH stand for and what is its purpose
Back
Secure Shell; it's used to securely access and manage remote systems over a network
Front
What does the term "inactive session timeout" refer to
Back
Disconnecting users automatically after periods of inactivity to enhance security
Front
What protocol is typically used for email encryption
Back
Secure/Multipurpose Internet Mail Extensions (S/MIME) or Pretty Good Privacy (PGP)
Front
What is the difference between TCP and UDP in terms of reliability
Back
TCP is connection-oriented and reliable, while UDP is connectionless and does not guarantee delivery
Front
What is port forwarding used for
Back
To redirect traffic from one port on a device to a different port or device
Front
What is the purpose of a firewall
Back
To monitor and control incoming and outgoing network traffic based on predetermined security rules
Front
Define port scanning
Back
The act of systematically scanning a computer's ports to identify open ports and services
Front
What is the term for disguising malicious network traffic as legitimate traffic
Back
Tunneling
Front
What port does HTTPS use by default
Back
Port 443
Front
What is the purpose of a VLAN in a network
Back
To create logically segmented networks within a physical network infrastructure
Front
What is the purpose of wireless encryption protocols such as WPA2
Back
To ensure secure communication over wireless networks by encrypting data
Front
What security principle does "Least Privilege" refer to
Back
Granting users and systems the minimum access necessary to perform tasks
Front
What is the difference between an IDS and an IPS
Back
An IDS detects threats and alerts on them, while an IPS actively blocks threats in real time
Front
What is the purpose of a time-based one-time password (TOTP)
Back
To provide a temporary and unique passcode for authentication, typically used in two-factor authentication
Front
What is the difference between symmetric and asymmetric encryption
Back
Symmetric uses the same key for encryption and decryption, whereas asymmetric uses a key pair (public and private keys)
Front
What does "spoofing" refer to in network security
Back
Faking the identity of a device or user to gain unauthorized access to a system
Front
Explain the purpose of SSL/TLS in networking
Back
To provide secure communication over the internet through encryption
Front
What does "OSI" in the OSI model stand for
Back
Open Systems Interconnection
Front
What does the term "media access control" refer to in networking
Back
The process and rules for transmitting data over a network medium
Front
Define the term "packet sniffer"
Back
A tool used to capture and analyze network traffic
1/50
This deck covers the fundamentals of network security, including secure communication protocols, network traffic analysis, and methods to protect network infrastructure.