Cards (84)

  • What are network security protection measures designed to protect against?
    Unauthorized access, data compromise
  • What is the purpose of strong authentication methods in network security?
    Verify user identity
  • MFA requires at least two different categories of authentication factors
  • Match the authentication factor with its example:
    Something you know ↔️ Password
    Something you have ↔️ Security token
    Something you are ↔️ Fingerprint
  • Security audits assess compliance with security policies and regulations
  • What do vulnerability assessments identify in a network?
    System vulnerabilities
  • What do vulnerability assessments identify, quantify, and prioritize?
    Vulnerabilities in a system
  • Conducting regular security audits and vulnerability assessments is crucial for maintaining network security
  • Security audits identify compliance with security policies and regulations.
  • What is the primary function of a firewall in network security?
    Filtering network traffic
  • IDS detects anomalies, while IPS actively prevents them from affecting the network
  • Symmetric encryption uses a single key for both encryption and decryption.
  • What does a Virtual Private Network (VPN) establish over the internet?
    Secure encrypted connection
  • Steps to protect against common network security threats
    1️⃣ Install antivirus software
    2️⃣ Use strong passwords
    3️⃣ Train users on social engineering
    4️⃣ Implement DDoS protection
  • Match the network security threat with its description:
    Malware ↔️ Harmful software designed to disrupt systems
    Social Engineering ↔️ Manipulating individuals to reveal information
    DDoS Attacks ↔️ Overwhelming a server with traffic
  • Firewalls filter incoming and outgoing traffic based on predefined rules
  • What are firewalls and ACLs crucial for in network security?
    Network security
  • Firewalls filter incoming and outgoing traffic
  • ACLs control access to network resources based on user roles and permissions.
  • Match the security measure with its function:
    Firewalls ↔️ Filter traffic
    ACLs ↔️ Control access to resources
  • What is an example use of a firewall in network security?
    Block unauthorized access
  • An example use of an ACL is to restrict employee access to sensitive data.
  • A firewall can block incoming traffic on specific ports.
  • What does encryption protect in data communication?
    Data confidentiality
  • HTTPS secures web traffic using TLS/SSL encryption.
  • What does a VPN protect between the user and the VPN server?
    All network traffic
  • HTTPS is commonly used for securing online transactions.
  • What is the main purpose of a VPN in network security?
    Secure encrypted connection
  • IDS and IPS are vital for safeguarding network traffic against malicious activities.
  • What does an IDS do when it detects suspicious traffic?
    Alerts administrators
  • An IPS blocks malicious traffic in real-time.
  • What is multi-factor authentication (MFA) designed to improve in network security?
    User identity verification
  • MFA offers higher security compared to single-factor authentication.
  • Steps to conduct a security audit:
    1️⃣ Assess security posture
    2️⃣ Ensure compliance with policies
    3️⃣ Provide recommendations
  • Vulnerability assessments prioritize technical vulnerabilities in a system.
  • What is the primary goal of network segmentation?
    Limit breach scope
  • Network isolation ensures that if one part is compromised, the others remain secure.
  • Match the network strategy with its scope:
    Network Segmentation ↔️ Divides network into segments
    Network Isolation ↔️ Completely isolates a system
  • Network security protection measures are strategies and technologies to protect a network and its data from unauthorized access, use, disclosure, disruption, modification, or destruction
  • How do firewalls prevent malicious network access?
    By filtering incoming and outgoing traffic