Google Cybersecurity Course 3

5.0(1)
studied byStudied by 4 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/78

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

79 Terms

1
New cards

Bandwidth

Maximum data transmission capacity over a network

2
New cards

Cloud computing

Using remote servers and network services hosted on the internet

3
New cards

cloud network

Collection of servers or computers storing resources and data in remote data centers

4
New cards

Data packet

Basic unit of information that travels from one device to another within a network

5
New cards

Hub

Network device that broadcasts information to every device on the network

6
New cards

Internet Protocol (IP)

Set of standards used for routing and addressing data packets on a network

7
New cards

IP Address

Unique string of characters identifying the location of a device on the internet

8
New cards

Local Area Network (LAN)

Network that spans small areas like an office building, a school, or a home

9
New cards

Media Access Control (MAC) address

Unique alphanumeric identifier assigned to each physical device on a network

10
New cards

Modem

Device that connects a router to the internet and brings internet access to the LAN

11
New cards

Network

Group of connected devices

12
New cards

Open Systems Interconnection (OSI) model

Standardized concept that describes the seven layers computers use to communicate and send data over the network

13
New cards

Packet sniffing

Capturing and inspecting data packets across a network

14
New cards

Port

Software-based location that organizes the sending and receiving of data between devices on a network

15
New cards

Router

Network device that connects multiple networks together

16
New cards

Speed

Rate at which a device sends and receives data, measured by bits per second

17
New cards

Subnetting

Subdivision of a network into logical groups called subnets

18
New cards

Switch

Device that makes connections between specific devices on a network by sending and receiving data between them

19
New cards

TCP/IP model

A framework for network data transmission

20
New cards

TCP (Transmission Control Protocol)

A protocol for internet communication and data streaming

21
New cards

UDP

A connectionless protocol for data transmission

22
New cards

WAN

A network that spans a large geographic area

23
New cards

Active packet sniffing

A type of attack where data packets are manipulated in transit

24
New cards

Address Resolution Protocol (ARP)

Used to determine the MAC address of the next router or device to traverse

25
New cards

Baseline configuration

A documented set of specifications within a system that is used as a basis for future builds, releases, and updates

26
New cards

Bluetooth

Used for wireless communication with nearby physical devices

27
New cards

Botnet

A collection of computers infected by malware that are under the control of a single threat actor, known as the "bot herder"

28
New cards

Cloud-based firewalls

Software firewalls that are hosted by the cloud service provider

29
New cards

Cloud network

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet

30
New cards

Controlled zone

A subnet that protects the internal network from the uncontrolled zone

31
New cards

Denial of service (DoS) attack

An attack that targets a network or server and floods it with network traffic

32
New cards

Distributed denial of service (DDoS) attack

A type of denial or service attack that uses multiple devices or servers located in different locations to flood the target network with unwanted traffic

33
New cards

Domain Name System (DNS)

A networking protocol that translates internet domain names into IP addresses

34
New cards

Encapsulation

A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets

35
New cards

File Transfer Protocol (FTP)

Used to transfer files from one device to another over a network

36
New cards

Firewall

A network security device that monitors traffic to or from your network

37
New cards

Forward proxy server

A server that regulates and restricts a person's access to the internet

38
New cards

Hardware

The physical components of a computer

39
New cards

Hypertext Transfer Protocol (HTTP)

An application layer protocol that provides a method of communication between clients and website servers

40
New cards

Hypertext Transfer Protocol Secure (HTTPS)

A network protocol that provides a secure method of communication between clients and servers

41
New cards

Identity and access management (IAM)

A collection of processes and technologies that helps organizations manage digital identities in their environment

42
New cards

IEEE 802.11 (Wi-Fi)

A set of standards that define communication for wireless LANs

43
New cards

Internet Control Message Protocol (ICMP)

An internet protocol used by devices to tell each other about data transmission errors across the network

44
New cards

Internet Control Message Protocol (ICMP) flood

A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server

45
New cards

Internet Protocol (IP) address

A unique string of characters that identifies the location of a device on the internet

46
New cards

IP spoofing

A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network

47
New cards

Local area network (LAN)

A network that spans small areas like an office building, a school, or a home

48
New cards

Multi-factor authentication (MFA)

A security measure that requires a user to verify their identity in two or more ways to access a system or network

49
New cards

Network log analysis

The process of examining network logs to identify events of interest

50
New cards

Network protocols

A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data

51
New cards

Network segmentation

A security technique that divides the network into segments

52
New cards

Operating system (OS)

The interface between computer hardware and the user

53
New cards

Open systems interconnection (OSI) model

A standardized concept that describes the seven layers computers use to communicate and send data over the network

54
New cards

On-path attack

An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit

55
New cards

Passive packet sniffing

A type of attack where a malicious actor connects to a network hub and looks at all traffic on the network

56
New cards

Patch update

A software and operating system update that addresses security vulnerabilities within a program or product

57
New cards

Penetration testing

A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes

58
New cards

Ping of death

A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB

59
New cards

Port filtering

A firewall function that blocks or allows certain port numbers to limit unwanted communication

60
New cards

Proxy server

A server that fulfills the requests of its clients by forwarding them to other servers

61
New cards

Replay attack

A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time

62
New cards

Reverse proxy server

A server that regulates and restricts the Internet's access to an internal server

63
New cards

Secure File Transfer Protocol (SFTP)

A secure protocol used to transfer files from one device to another over a network

64
New cards

Secure shell (SSH)

A security protocol used to create a shell with a remote system

65
New cards

Security hardening

The process of strengthening a system to reduce its vulnerabilities and attack surface

66
New cards

Security information and event management (SIEM)

An application that collects and analyzes log data to monitors critical activities for an organization

67
New cards

Security zone

A segment of a company's network that protects the internal network from the internet

68
New cards

Simple Network Management Protocol (SNMP)

A network protocol used for monitoring and managing devices on a network

69
New cards

Smurf attack

A network attack performed when an attacker sniffs an authorized user's IP address and floods it with ICMP packets

70
New cards

Stateful

A class of firewall that keeps track of information passing through it and proactively filters out threats

71
New cards

Stateless

A class of firewall that operates based on predefined rules and that does not keep track of information from data packets

72
New cards

Synchronize (SYN) flood attack

A type of DoS attack that simulates a TCP/IP connection and floods a server with SYN packets

73
New cards

Transmission Control Protocol (TCP)

An internet communication protocol that allows two devices to form a connection and stream data

74
New cards

Transmission control protocol (TCP) 3-way handshake

A three-step process used to establish an authenticated connection between two devices on a network

75
New cards

Uncontrolled zone

The portion of the network outside the organization

76
New cards

User Datagram Protocol (UDP)

A connectionless protocol that does not establish a connection between devices before transmissions

77
New cards

Virtual Private Network (VPN)

A network security service that changes your public IP address and masks your virtual location so that you can keep your data private when you are using a public network like the internet

78
New cards

Wide Area Network (WAN)

A network that spans a large geographic area like a city, state, or country

79
New cards

Wi-Fi Protected Access (WPA)

A wireless security protocol for devices to connect to the internet