Bash, the Crucial Exams Chat Bot
AI Bot

SSCP - Network and Communications Security  Flashcards

ISC2 Systems Security Certified Practitioner (SSCP) Flashcards

FrontBack
At which OSI layer does encryption typically occurPresentation layer (Layer 6)
Define port scanningThe act of systematically scanning a computer's ports to identify open ports and services
Define the term "packet sniffer"A tool used to capture and analyze network traffic
Explain the purpose of MAC filteringTo allow or restrict devices based on their MAC address at the network level
Explain the purpose of SSL/TLS in networkingTo provide secure communication over the internet through encryption
What does "OSI" in the OSI model stand forOpen Systems Interconnection
What does "spoofing" refer to in network securityFaking the identity of a device or user to gain unauthorized access to a system
What does a VPN provide during communicationIt ensures secure and encrypted communication over untrusted networks
What does SSH stand for and what is its purposeSecure Shell; it's used to securely access and manage remote systems over a network
What does the term "inactive session timeout" refer toDisconnecting users automatically after periods of inactivity to enhance security
What does the term "man-in-the-middle attack" (MITM) refer toAn attack where a third party intercepts and potentially alters communication between two parties
What does the term "media access control" refer to in networkingThe process and rules for transmitting data over a network medium
What does the term "phishing" refer toA cyber attack that uses deceptive emails or messages to steal sensitive information
What does the term "zero trust" refer toA security model where all users and devices are verified continuously without assuming trust based on location or credentials
What does the term DDoS stand forDistributed Denial of Service
What is 802.11A set of standards for implementing wireless local area network (WLAN) communication
What is a Demilitarized Zone (DMZ) in networkingAn isolated network segment used to host public-facing services while protecting the internal network
What is a subnet mask used forTo distinguish the network and host portions of an IP address
What is DHCP's primary purpose in networkingTo automatically assign IP addresses to devices on a network
What is port forwarding used forTo redirect traffic from one port on a device to a different port or device
What is the difference between an IDS and an IPSAn IDS detects threats and alerts on them, while an IPS actively blocks threats in real time
What is the difference between stateful and stateless firewallsStateful firewalls track the state of connections and filter traffic based on state, while stateless firewalls filter based only on predefined rules
What is the difference between symmetric and asymmetric encryptionSymmetric uses the same key for encryption and decryption, whereas asymmetric uses a key pair (public and private keys)
What is the difference between TCP and UDP in terms of reliabilityTCP is connection-oriented and reliable, while UDP is connectionless and does not guarantee delivery
What is the function of a load balancerTo distribute network traffic across multiple servers for improved performance and reliability
What is the function of a SIEM systemTo collect, analyze, and monitor security event data for potential threats
What is the function of the BGP protocolTo exchange routing information between different autonomous systems on the internet
What is the main difference between a switch and a hubA switch forwards traffic to specific devices, while a hub sends traffic to all connected devices
What is the primary function of a VPN concentratorTo manage and handle multiple VPN connections simultaneously
What is the primary function of an Intrusion Detection System (IDS)To monitor for and alert on malicious or suspicious activities on a network
What is the primary function of an Intrusion Prevention System (IPS)To detect and actively block threats to a network
What is the primary purpose of NAT (Network Address Translation)To allow multiple devices on a private network to share a single public IP address
What is the primary use of the ICMP protocolTo send error messages and operational information, such as in ping requests
What is the principle behind defense in depthUsing multiple layers of security to protect a system or network
What is the purpose of a firewallTo monitor and control incoming and outgoing network traffic based on predetermined security rules
What is the purpose of a honeypot in network securityTo lure attackers away from actual data and study their behavior
What is the purpose of a time-based one-time password (TOTP)To provide a temporary and unique passcode for authentication, typically used in two-factor authentication
What is the purpose of a VLAN in a networkTo create logically segmented networks within a physical network infrastructure
What is the purpose of network segmentationTo divide a network into smaller segments to limit the spread of an attack or isolate sensitive resources
What is the purpose of the ARP protocolTo map an IP address to a device's physical MAC address within a local network
What is the purpose of wireless encryption protocols such as WPA2To ensure secure communication over wireless networks by encrypting data
What is the role of a certificate authority (CA)To issue and verify digital certificates for secure communications
What is the role of a proxy server in a networkTo act as an intermediary between clients and servers, offering caching and filtering
What is the role of DNS in networkingTo translate human-readable domain names into IP addresses
What is the term for disguising malicious network traffic as legitimate trafficTunneling
What port does HTTP use by defaultPort 80
What port does HTTPS use by defaultPort 443
What protocol ensures secure browsing over the internetHTTPS (Hypertext Transfer Protocol Secure)
What protocol is typically used for email encryptionSecure/Multipurpose Internet Mail Extensions (S/MIME) or Pretty Good Privacy (PGP)
What security principle does "Least Privilege" refer toGranting users and systems the minimum access necessary to perform tasks
This deck covers the fundamentals of network security, including secure communication protocols, network traffic analysis, and methods to protect network infrastructure.
Share on...
Follow us on...