Bash, the Crucial Exams Chat Bot
AI Bot
SSCP - Network and Communications Security Flashcards
ISC2 Systems Security Certified Practitioner (SSCP) Flashcards
| Front | Back |
| At which OSI layer does encryption typically occur | Presentation layer (Layer 6) |
| Define port scanning | The act of systematically scanning a computer's ports to identify open ports and services |
| Define the term "packet sniffer" | A tool used to capture and analyze network traffic |
| Explain the purpose of MAC filtering | To allow or restrict devices based on their MAC address at the network level |
| Explain the purpose of SSL/TLS in networking | To provide secure communication over the internet through encryption |
| What does "OSI" in the OSI model stand for | Open Systems Interconnection |
| What does "spoofing" refer to in network security | Faking the identity of a device or user to gain unauthorized access to a system |
| What does a VPN provide during communication | It ensures secure and encrypted communication over untrusted networks |
| What does SSH stand for and what is its purpose | Secure Shell; it's used to securely access and manage remote systems over a network |
| What does the term "inactive session timeout" refer to | Disconnecting users automatically after periods of inactivity to enhance security |
| What does the term "man-in-the-middle attack" (MITM) refer to | An attack where a third party intercepts and potentially alters communication between two parties |
| What does the term "media access control" refer to in networking | The process and rules for transmitting data over a network medium |
| What does the term "phishing" refer to | A cyber attack that uses deceptive emails or messages to steal sensitive information |
| What does the term "zero trust" refer to | A security model where all users and devices are verified continuously without assuming trust based on location or credentials |
| What does the term DDoS stand for | Distributed Denial of Service |
| What is 802.11 | A set of standards for implementing wireless local area network (WLAN) communication |
| What is a Demilitarized Zone (DMZ) in networking | An isolated network segment used to host public-facing services while protecting the internal network |
| What is a subnet mask used for | To distinguish the network and host portions of an IP address |
| What is DHCP's primary purpose in networking | To automatically assign IP addresses to devices on a network |
| What is port forwarding used for | To redirect traffic from one port on a device to a different port or device |
| What is the difference between an IDS and an IPS | An IDS detects threats and alerts on them, while an IPS actively blocks threats in real time |
| What is the difference between stateful and stateless firewalls | Stateful firewalls track the state of connections and filter traffic based on state, while stateless firewalls filter based only on predefined rules |
| What is the difference between symmetric and asymmetric encryption | Symmetric uses the same key for encryption and decryption, whereas asymmetric uses a key pair (public and private keys) |
| What is the difference between TCP and UDP in terms of reliability | TCP is connection-oriented and reliable, while UDP is connectionless and does not guarantee delivery |
| What is the function of a load balancer | To distribute network traffic across multiple servers for improved performance and reliability |
| What is the function of a SIEM system | To collect, analyze, and monitor security event data for potential threats |
| What is the function of the BGP protocol | To exchange routing information between different autonomous systems on the internet |
| What is the main difference between a switch and a hub | A switch forwards traffic to specific devices, while a hub sends traffic to all connected devices |
| What is the primary function of a VPN concentrator | To manage and handle multiple VPN connections simultaneously |
| What is the primary function of an Intrusion Detection System (IDS) | To monitor for and alert on malicious or suspicious activities on a network |
| What is the primary function of an Intrusion Prevention System (IPS) | To detect and actively block threats to a network |
| What is the primary purpose of NAT (Network Address Translation) | To allow multiple devices on a private network to share a single public IP address |
| What is the primary use of the ICMP protocol | To send error messages and operational information, such as in ping requests |
| What is the principle behind defense in depth | Using multiple layers of security to protect a system or network |
| What is the purpose of a firewall | To monitor and control incoming and outgoing network traffic based on predetermined security rules |
| What is the purpose of a honeypot in network security | To lure attackers away from actual data and study their behavior |
| What is the purpose of a time-based one-time password (TOTP) | To provide a temporary and unique passcode for authentication, typically used in two-factor authentication |
| What is the purpose of a VLAN in a network | To create logically segmented networks within a physical network infrastructure |
| What is the purpose of network segmentation | To divide a network into smaller segments to limit the spread of an attack or isolate sensitive resources |
| What is the purpose of the ARP protocol | To map an IP address to a device's physical MAC address within a local network |
| What is the purpose of wireless encryption protocols such as WPA2 | To ensure secure communication over wireless networks by encrypting data |
| What is the role of a certificate authority (CA) | To issue and verify digital certificates for secure communications |
| What is the role of a proxy server in a network | To act as an intermediary between clients and servers, offering caching and filtering |
| What is the role of DNS in networking | To translate human-readable domain names into IP addresses |
| What is the term for disguising malicious network traffic as legitimate traffic | Tunneling |
| What port does HTTP use by default | Port 80 |
| What port does HTTPS use by default | Port 443 |
| What protocol ensures secure browsing over the internet | HTTPS (Hypertext Transfer Protocol Secure) |
| What protocol is typically used for email encryption | Secure/Multipurpose Internet Mail Extensions (S/MIME) or Pretty Good Privacy (PGP) |
| What security principle does "Least Privilege" refer to | Granting users and systems the minimum access necessary to perform tasks |
This deck covers the fundamentals of network security, including secure communication protocols, network traffic analysis, and methods to protect network infrastructure.