Network+ N10-009 4.0 Network Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/46

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

47 Terms

1
New cards
Logical security(Encryption)
Method of protecting information using coded formats
Data in transit - Data moving across network
Data at rest - Stored, inactive data
2
New cards
Logical security(Certificates)
Digital documents used for identity validation
Public key infrastructure (PKI) - Hierarchy of trust keys
Self-signed - Generated without authority
3
New cards
Logical security(Identity and access management (IAM))
Framework for managing user identities and permissions
Authentication - Verifies user identity
Multifactor authentication (MFA) - Uses multiple verification factors
Single sign-on (SSO) - One login for many apps
Remote Authentication Dial-in User Service (RADIUS) - Centralized authentication protocol
LDAP - Directory-based authentication service
Security Assertion Markup Language (SAML) - Standard for identity exchange
Terminal Access Controller Access Control System Plus (TACACS+) - Cisco authentication protocol
Time-based authentication - Temporary time-sensitive codes
Authorization - Determines user permissions
Least privilege - Minimum access required
Role-based access control - Permissions tied to roles
4
New cards
Logical security(Geofencing)
Security that restricts access by physical location
5
New cards
Physical security(Camera)
Video surveillance to monitor activity
6
New cards
Physical security(Locks)
Physical barriers preventing unauthorized access
7
New cards
Deception technologies(Honeypot)
Decoy system designed to lure attackers
8
New cards
Deception technologies(Honeynet)
Network of decoys to observe attacker behavior
9
New cards
Common security terminology(Risk)
Potential for harm from a threat
10
New cards
Common security terminology(Vulnerability)
Weakness that can be exploited
11
New cards
Common security terminology(Exploit)
Method of taking advantage of a vulnerability
12
New cards
Common security terminology(Threat)
Potential cause of harm to assets
13
New cards
Common security terminology(Confidentiality, Integrity, and Availability (CIA) triad)
Model for securing data and systems
14
New cards
Audits and regulatory compliance(Data locality)
Requirement to keep data in specific regions
15
New cards
Audits and regulatory compliance(Payment Card Industry Data Security Standards (PCI DSS))
Standards for protecting payment card data
16
New cards
Audits and regulatory compliance(General Data Protection Regulation (GDPR))
European law for personal data protection
17
New cards
Network segmentation enforcement(Internet of Things (IoT) and Industrial Internet of Things (IIoT))
Separation of consumer and industrial connected devices
18
New cards
Network segmentation enforcement(Supervisory control and data acquisition (SCADA), industrial control System (ICS), operational technology (OT))
Segmentation of critical infrastructure systems
19
New cards
Network segmentation enforcement(Guest)
Isolated network for visitor devices
20
New cards
Network segmentation enforcement(Bring your own device (BYOD))
Policy allowing personal devices with network restrictions
21
New cards
Denial-of-service (DoS)/distributed denial-of-service (DDoS)
Attacks that overwhelm systems with traffic
22
New cards
VLAN hopping
Attack where traffic is injected into other VLANs
23
New cards
Media Access Control (MAC) flooding
Attack that overwhelms switch tables with fake MAC addresses
24
New cards
Address Resolution Protocol (ARP) poisoning
Technique to map attacker’s MAC to another IP
25
New cards
ARP spoofing
Forged ARP messages to redirect traffic
26
New cards
DNS poisoning
Corrupts DNS cache with false records
27
New cards
DNS spoofing
Fakes DNS responses to redirect users
28
New cards
Rogue devices and services(DHCP)
Unauthorized DHCP server handing out bad addresses
29
New cards
Rogue devices and services(AP)
Unauthorized access point imitating a trusted one
30
New cards
Evil twin
Malicious wireless access point that mimics a legitimate one
31
New cards
On-path attack
Attacker intercepts communication between two parties
32
New cards
Social engineering(Phishing)
Tricking users into revealing information via email or messages
33
New cards
Social engineering(Dumpster diving)
Retrieving sensitive information from discarded materials
34
New cards
Social engineering(Shoulder surfing)
Stealing information by looking over someone’s shoulder
35
New cards
Social engineering(Tailgating)
Following authorized users into secure areas
36
New cards
Malware
Malicious software designed to harm, disrupt, or steal
37
New cards
Device hardening(Disable unused ports and services)
Turning off unneeded features to reduce attack surface
38
New cards
Device hardening(Change default passwords)
Replacing vendor-provided passwords with secure ones
39
New cards
Network access control (NAC)(Port security)
Restricts access to switch ports
40
New cards
Network access control (NAC)(802.1X)
Port-based authentication standard
41
New cards
Network access control (NAC)(MAC filtering)
Controls devices by MAC address
42
New cards
Key management
Process of handling encryption keys securely
43
New cards
Security rules(Access control list (ACL))
Rules defining allowed or denied traffic
44
New cards
Security rules(Uniform Resource Locator (URL) filtering)
Blocking access to specific websites
45
New cards
Security rules(Content filtering)
Restricting access to certain content types
46
New cards
Zones(Trusted vs. untrusted)
Defined network security boundaries
47
New cards
Zones(Screened subnet)
Isolated network area for public-facing server