N10-009 - Network Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Data at rest

On computer storage

2
New cards

Data in transit

Traveling along cables or broadcasting wirelessly

3
New cards

Risk

Potential for loss or damage

4
New cards

Vulnerability

A defect that creates an exploitable condition, making the system vulnerable to attacks

5
New cards

Exploit

Code that takes advantage of a vulnerability in a system or software to gain unauthorized access

6
New cards

Threat

Potential danger that can harm your systems, data, or operations

7
New cards

Least privilege

Only granting the minimum access necessary to perform actions

8
New cards

Honeypot/honeynet

Individual/connected devices inviting attacks to capture information

9
New cards

IAM

Identity and access management

10
New cards

MFA

Multifactor authentication

11
New cards

SSO

Single sign-on

12
New cards

PKI

Public Key Infrastructure

13
New cards

SAML

Security Assertion Markup Language

14
New cards

CIA

Confidentiality, Integrity, and Availability

15
New cards

RADIUS

For authentication, authorization, and accounting

16
New cards

TACACS+

Terminal Access Controller Access Control System Plus

17
New cards

ICS

Industrial Control System

18
New cards

BYOD

Bring Your Own Device

19
New cards

SCADA

Supervisory control and data acquisition

20
New cards

OT

Operational technology

21
New cards

GDPR

General Data Protection Regulation

22
New cards

PCI DSS

Payment Card Industry Data Security Standard

23
New cards

IoT

Internet of Things

24
New cards

IIoT

Industrial Internet of Things

25
New cards

VLAN hopping

Attacker can move from one VLAN to another

26
New cards

Media Access Control (MAC) flooding

Displacing legitimate MAC entries, forcing data into broadcast mode

27
New cards

Address Resolution Protocol (ARP) poisoning/spoofing

Forged ARP messages to redirect traffic from the victim

28
New cards

DoS

Denial-of-service

29
New cards

DDoS

Distributed denial-of-service

30
New cards

DNS poisoning

Exploit known DNS vulnerabilities

31
New cards

DNS spoofing

Forged DNS data to redirect traffic to hacker

32
New cards

Evil twin

Fake Wi-Fi access point to trick people into choosing it over the genuine one

33
New cards

On-path attack/Man-in-the-middle (MITM) attack

Intercept a two-party conversation for one’s advantage and some tools include: ettercap, wireshark, tcpdump

34
New cards

Phishing

Attack by email; single target

35
New cards

Dumpster diving

Recover information from trash

36
New cards

Shoulder surfing

Look over someone’s shoulder, often with a recording device

37
New cards

Tailgating

Unauthorized entity follows authorized party into secured premises

38
New cards

Device hardening

Reducing the attack surface to secure a device

39
New cards

802.1X

For port-based network access control (PNAC)

40
New cards

MAC filtering

Control network access by device MAC

41
New cards

NAC

Network access control

42
New cards

ACL

Access control list

43
New cards

Uniform Resource Locator (URL) filtering

Allow/block website access by URL

44
New cards

Screened subnet (demilitarized zone, DMZ)

Five components: external network, external router, perimeter network, internal router, internal network