4.1.5 Network security:

Cards (59)

  • Confidentiality in network security ensures that sensitive information is accessible to all users.
    False
  • Availability in network security guarantees that network resources are accessible when needed.
    True
  • Hacking involves unauthorized individuals gaining access to a network to steal data or disrupt operations
  • What is eavesdropping in network security?
    Monitoring network traffic
  • Encryption ensures confidentiality by converting data into a coded format.

    True
  • Firewalls block unauthorized access and prevent disruptions to network availability
  • What are the primary goals of network security?
    Confidentiality, integrity, availability
  • Firewalls prevent disruptions to availability by blocking malicious traffic.

    True
  • Encryption ensures data confidentiality
  • Firewalls monitor network traffic to ensure data availability
  • Backups ensure data integrity and availability in case of loss or corruption.
    True
  • What is the primary goal of authentication in network security?
    Verifying user identity
  • Match the authentication method with its primary advantage:
    Biometrics ↔️ Highly secure, difficult to forge
    Multi-factor Authentication (MFA) ↔️ Provides an extra layer of security
  • Firewalls use techniques such as packet filtering, stateful inspection, and proxy firewalls to filter traffic.

    True
  • The appropriate type of firewall depends on the size and security needs of the network
  • What does integrity in network security ensure about data?
    Accuracy and consistency
  • Malware includes viruses, worms, and Trojans, which can disrupt or damage a network.
    True
  • Eavesdropping involves unauthorized monitoring of network traffic to steal sensitive information
  • Firewalls block unauthorized access to maintain availability.

    True
  • Backups ensure both data integrity and availability
  • What is the purpose of authentication?
    Verify user identity
  • Passwords are familiar to users but can be easily compromised
  • Effective authentication methods contribute to confidentiality and integrity
  • Hardware firewalls are less secure than software firewalls.
    False
  • A software firewall relies on the operating system's security
  • Firewalls protect against DoS attacks by controlling network traffic.

    True
  • Match the IDS component with its function:
    Sensors ↔️ Collect network traffic
    Analysis Engine ↔️ Identify suspicious patterns
    Database ↔️ Store intrusion signatures
  • Host-based IDS provides detailed insights at the server level.
    True
  • Match the security aspect with its description:
    Confidentiality ↔️ Authorized access to data
    Integrity ↔️ Accuracy of data
    Availability ↔️ Accessible network resources
  • Network security aims to ensure the confidentiality, integrity, and availability
  • Integrity in network security maintains the accuracy and consistency of data
  • What is the purpose of malware in a network threat?
    Disrupt or gain access
  • Denial of Service (DoS) attacks overwhelm a network with traffic, rendering it unavailable.
    True
  • Social engineering involves manipulating people into revealing sensitive information
  • How do access controls maintain integrity in a network?
    Restrict user access
  • Backups ensure availability and integrity by creating copies of data.

    True
  • Encryption converts data into a coded format accessible only with a decryption key
  • Steps to implement network security measures
    1️⃣ Identify network threats
    2️⃣ Implement encryption
    3️⃣ Set up access controls
    4️⃣ Install firewalls
    5️⃣ Create data backups
  • Access controls maintain data integrity by preventing unauthorized modifications.
    True
  • What type of software detects and removes malicious code to protect data?
    Antivirus/Antimalware