Module 16

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Network Security Fundamentals

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

What does the CIA Triad stand for?

Confidentiality, Integrity, Availability.

2
New cards

What is malware?

Malicious software designed to harm or exploit devices or data.

3
New cards

What does a firewall do?

Controls incoming and outgoing network traffic based on security rules.

4
New cards

What is phishing?

Fraudulent attempts to obtain sensitive information via deceptive emails or websites.

5
New cards

What is social engineering?

Manipulating people to give up confidential information.

6
New cards

What is a DoS attack?

Denial of Service — floods a system to make it unavailable.

7
New cards

What does VPN stand for?

Virtual Private Network.

8
New cards

Why are software updates important for security?

They patch vulnerabilities and fix security bugs.

9
New cards

What is port security?

A switch feature that limits devices that can connect to a port.

10
New cards

How can you protect against man-in-the-middle attacks?

Use encryption protocols like HTTPS, VPNs, and strong authentication.

11
New cards
In which network model does each device act as both a client and a server?
Peer-to-Peer Model
12
New cards
What is the primary advantage of a client-server network over a peer-to-peer network?
Centralized control and better scalability.
13
New cards
What is the key weakness of a peer-to-peer network in terms of security?
Lack of centralized management makes enforcing security harder.
14
New cards
Which model is easier and cheaper to set up for small home networks?
Peer-to-Peer Model
15
New cards
In the client-server model, what happens if the server fails?
Clients cannot access the services until the server is restored.
16
New cards
What is a real-world example of a P2P application used for file sharing?
BitTorrent
17
New cards
Which layer of the OSI model prepares data by encryption and compression before transmission?
Presentation Layer
18
New cards
Which layer of the OSI model is responsible for managing sessions and dialogue between two hosts?
Session Layer
19
New cards
True or False: Peer-to-peer networks require a dedicated server to function.
False
20
New cards
What kind of network model does a web browser accessing a website represent?
Client-Server Model