1/16
A set of flashcards summarizing key concepts covered in the ITSS 4360 Network & Information Security Exam 2.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is network segmentation?
The practice of splitting a network into smaller, isolated sections to improve performance and security.
What is a DMZ in network security?
A sub-network that contains an organization’s external-facing services to act as a buffer between the untrusted internet and the private internal network.
What is the difference between East-West and North-South traffic?
North-South traffic moves in and out of the data center (client to server), while East-West traffic moves between servers within the data center.
What is a stateful inspection firewall?
A firewall that tracks the state of active connections and allows return traffic automatically if it belongs to an established session.
What is an IDS?
Intrusion Detection System, a detective control that monitors traffic and alerts administrators of suspicious activity.
What does a Load Balancer do?
Distributes incoming network traffic across multiple servers to ensure high availability and prevent server overload.
What is a honeypot?
A decoy system designed to lure attackers away from production systems and gather intelligence on their methods.
What is DNSSEC?
A security extension that provides authentication and integrity for DNS data through digital signatures.
What are the categories of hypervisors?
Type 1 hypervisors run directly on hardware (Bare Metal), and Type 2 hypervisors run as applications on existing Operating Systems (Hosted).
What does IaaS stand for?
Infrastructure as a Service, where the provider manages hardware and the customer manages OS, apps, and data.
What is the purpose of a captive portal?
A web page that forces a user to authenticate or accept terms before gaining network access.
What is the AAA Framework?
Authentication, Authorization, and Accounting, which defines user verification, permissions, and tracking activities.
What is MFA?
Multi-Factor Authentication, which requires multiple forms of verification to gain access.
What is the primary function of Kerberos?
To provide Single Sign-On (SSO) in Windows Active Directory environments using 'tickets'.
What is the main objective of incident response?
To effectively manage and mitigate security incidents by following a structured lifecycle.
What are Recovery Time Objective (RTO) and Recovery Point Objective (RPO)?
RTO is the maximum acceptable time to restore a system; RPO is the maximum acceptable amount of data loss measured in time.
What are the OSI Model layers from the top to the bottom?
Layer 7 - Application, Layer 6 - Presentation, Layer 5 - Session, Layer 4 - Transport, Layer 3 - Network, Layer 2 - Data Link, Layer 1 - Physical.