Save
...
Topic 4: Networks
4.1 Computer Networks
4.1.5 Network security:
Save
Share
Learn
Content
Leaderboard
Share
Learn
Cards (59)
Confidentiality in network security ensures that sensitive information is accessible to all users.
False
Availability in network security guarantees that network resources are accessible when needed.
True
Hacking involves unauthorized individuals gaining access to a network to steal data or disrupt
operations
What is eavesdropping in network security?
Monitoring network traffic
Encryption ensures
confidentiality
by converting data into a coded format.
True
Firewalls block unauthorized access and prevent disruptions to network
availability
What are the primary goals of network security?
Confidentiality, integrity, availability
Firewalls prevent disruptions to availability by blocking
malicious
traffic.
True
Encryption ensures data
confidentiality
Firewalls monitor network traffic to ensure data
availability
Backups ensure data integrity and availability in case of loss or corruption.
True
What is the primary goal of authentication in network security?
Verifying user identity
Match the authentication method with its primary advantage:
Biometrics ↔️ Highly secure, difficult to forge
Multi-factor Authentication (MFA) ↔️ Provides an extra layer of security
Firewalls use techniques such as packet filtering, stateful inspection, and
proxy firewalls
to filter traffic.
True
The appropriate type of firewall depends on the size and security needs of the
network
What does integrity in network security ensure about data?
Accuracy and consistency
Malware includes viruses, worms, and Trojans, which can disrupt or damage a network.
True
Eavesdropping involves unauthorized monitoring of network traffic to steal sensitive
information
Firewalls block unauthorized access to maintain
availability
.
True
Backups ensure both data integrity and
availability
What is the purpose of authentication?
Verify user identity
Passwords are familiar to users but can be easily
compromised
Effective authentication methods contribute to confidentiality and
integrity
Hardware firewalls are less secure than software firewalls.
False
A software firewall relies on the operating system's
security
Firewalls protect against
DoS
attacks by controlling network traffic.
True
Match the IDS component with its function:
Sensors ↔️ Collect network traffic
Analysis Engine ↔️ Identify suspicious patterns
Database ↔️ Store intrusion signatures
Host-based IDS provides detailed insights at the server level.
True
Match the security aspect with its description:
Confidentiality ↔️ Authorized access to data
Integrity ↔️ Accuracy of data
Availability ↔️ Accessible network resources
Network security aims to ensure the confidentiality, integrity, and
availability
Integrity in network security maintains the accuracy and consistency of
data
What is the purpose of malware in a network threat?
Disrupt or gain access
Denial of Service (DoS) attacks overwhelm a network with traffic, rendering it unavailable.
True
Social engineering involves manipulating people into revealing sensitive
information
How do access controls maintain integrity in a network?
Restrict user access
Backups ensure availability and
integrity
by creating copies of data.
True
Encryption converts data into a coded format accessible only with a decryption
key
Steps to implement network security measures
1️⃣ Identify network threats
2️⃣ Implement encryption
3️⃣ Set up access controls
4️⃣ Install firewalls
5️⃣ Create data backups
Access controls maintain data integrity by preventing unauthorized modifications.
True
What type of software detects and removes malicious code to protect data?
Antivirus/Antimalware
See all 59 cards