What are network security protection measures designed to protect against?
Unauthorized access, data compromise
What is the purpose of strong authentication methods in network security?
Verify user identity
MFA requires at least two different categories of authentication factors
Match the authentication factor with its example:
Something you know ↔️ Password
Something you have ↔️ Security token
Something you are ↔️ Fingerprint
Security audits assess compliance with security policies and regulations
What do vulnerability assessments identify in a network?
System vulnerabilities
What do vulnerability assessments identify, quantify, and prioritize?
Vulnerabilities in a system
Conducting regular security audits and vulnerability assessments is crucial for maintaining network security
Security audits identify compliance with security policies and regulations.
What is the primary function of a firewall in network security?
Filtering network traffic
IDS detects anomalies, while IPS actively prevents them from affecting the network
Symmetric encryption uses a single key for both encryption and decryption.
What does a Virtual Private Network (VPN) establish over the internet?
Secure encrypted connection
Steps to protect against common network security threats
1️⃣ Install antivirus software
2️⃣ Use strong passwords
3️⃣ Train users on social engineering
4️⃣ Implement DDoS protection
Match the network security threat with its description:
Malware ↔️ Harmful software designed to disrupt systems
Social Engineering ↔️ Manipulating individuals to reveal information
DDoS Attacks ↔️ Overwhelming a server with traffic
Firewalls filter incoming and outgoing traffic based on predefined rules
What are firewalls and ACLs crucial for in network security?
Network security
Firewalls filter incoming and outgoing traffic
ACLs control access to network resources based on user roles and permissions.
Match the security measure with its function:
Firewalls ↔️ Filter traffic
ACLs ↔️ Control access to resources
What is an example use of a firewall in network security?
Block unauthorized access
An example use of an ACL is to restrict employee access to sensitive data.
A firewall can block incoming traffic on specific ports.
What does encryption protect in data communication?
Data confidentiality
HTTPS secures web traffic using TLS/SSL encryption.
What does a VPN protect between the user and the VPN server?
All network traffic
HTTPS is commonly used for securing online transactions.
What is the main purpose of a VPN in network security?
Secure encrypted connection
IDS and IPS are vital for safeguarding network traffic against malicious activities.
What does an IDS do when it detects suspicious traffic?
Alerts administrators
An IPS blocks malicious traffic in real-time.
What is multi-factor authentication (MFA) designed to improve in network security?
User identity verification
MFA offers higher security compared to single-factor authentication.
Steps to conduct a security audit:
1️⃣ Assess security posture
2️⃣ Ensure compliance with policies
3️⃣ Provide recommendations
Vulnerability assessments prioritize technical vulnerabilities in a system.
What is the primary goal of network segmentation?
Limit breach scope
Network isolation ensures that if one part is compromised, the others remain secure.
Match the network strategy with its scope:
Network Segmentation ↔️ Divides network into segments
Network Isolation ↔️ Completely isolates a system
Network security protection measures are strategies and technologies to protect a network and its data from unauthorized access, use, disclosure, disruption, modification, or destruction
How do firewalls prevent malicious network access?