Sec+ 07-08 Identify Network Security for an IT Network

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards

Network Security

Practices and technologies designed to protect the integrity, confidentiality, and availability of computer networks and data.

2
New cards

Demilitarized Zone (DMZ)

A separate network located outside the secure network perimeter, allowing untrusted outside users to access certain services without compromising the secure network.

3
New cards

Network Address Translation (NAT)

A technique that allows private IP addresses to be used on the public Internet by replacing them with public IP addresses.

4
New cards

Virtual LAN (VLAN)

A logical grouping of network devices that allows scattered users to be logically grouped together despite physical separation.

5
New cards

Firewall

A network security device that inspects and controls incoming and outgoing network traffic based on predetermined security rules.

6
New cards

Intrusion Detection System (IDS)

A system that monitors network traffic for suspicious activity and issues alerts when such activity is detected.

7
New cards

Intrusion Prevention System (IPS)

A network security device that monitors network traffic and takes action to block malicious activity.

8
New cards

Simple Network Management Protocol (SNMP)

A protocol used for managing devices on IP networks, allowing administrators to monitor, configure, and manage network devices.

9
New cards

Encryption

The process of converting information or data into a code to prevent unauthorized access.

10
New cards

Secure Copy Protocol (SCP)

A network protocol used to securely transfer files between hosts over a secure connection.

11
New cards

Host Intrusion Detection System (HIDS)

A software application designed to detect suspicious activity or policy violations on a single host or device.

12
New cards

Network Access Control (NAC)

A security technology that enforces policies on devices attempting to access a network, ensuring compliance before granting access.

13
New cards

Transport Layer Security (TLS)

A cryptographic protocol designed to provide secure communication over a computer network.

14
New cards

MAC Filtering

A security technique that restricts network access based on MAC addresses, typically implemented in network switches.

15
New cards

Packet Filtering

A method used by firewalls to control network traffic by examining each packet and allowing or blocking it based on predetermined rules.

16
New cards

SYN Flood Attack

A type of denial-of-service attack that overwhelms a target with TCP connection requests.

17
New cards

Spam Filter

A software application designed to detect unsolicited and unwanted email messages, commonly referred to as spam.

18
New cards

Load Balancer

A device or software that distributes network or application traffic across multiple servers to optimize resource use.

19
New cards

IP Telephony

The use of Internet Protocol technology to transmit voice communications over the Internet rather than the traditional public switched telephone network.

20
New cards

Cloud Computing

The delivery of computing services over the Internet, allowing users to access and store data on remote servers.

21
New cards

Packet Sniffer

A tool that captures and analyzes packets on a network, helpful in diagnosing network issues and monitoring traffic.

22
New cards

Active Directory (AD)

A directory service developed by Microsoft for Windows domain networks, providing a variety of network services.

23
New cards

___ is the process of converting information into a code to prevent unauthorized access.

Encryption

24
New cards

A ___ is a separate network located outside the secure network perimeter, allowing untrusted users access to certain services.

Demilitarized Zone (DMZ)

25
New cards

___ is a technique that allows private IP addresses to be used on the Internet by replacing them with public IP addresses.

Network Address Translation (NAT)

26
New cards

A ___ is a network security device that inspects and controls traffic based on predetermined security rules.

Firewall

27
New cards

___ is a system that monitors network traffic for suspicious activity and issues alerts.

Intrusion Detection System (IDS)

28
New cards

An ___ is a device that monitors and takes action to block malicious network activity.

Intrusion Prevention System (IPS)

29
New cards

___ is a protocol used for managing devices on IP networks, allowing administrators to monitor network devices.

Simple Network Management Protocol (SNMP)

30
New cards

The practice of restricting network access based on MAC addresses is known as ___.

MAC Filtering

31
New cards

A ___ attack overwhelms a target with TCP connection requests, causing denial of service.

SYN Flood Attack

32
New cards

___ is a software application designed to detect unsolicited and unwanted email messages.

Spam Filter

33
New cards

What is the purpose of a firewall?

To inspect and control incoming and outgoing network traffic based on predetermined security rules.

34
New cards

What does NAT stand for?

Network Address Translation.

35
New cards

Which protocol is used for secure file transfer?

Secure Copy Protocol (SCP).

36
New cards

What is the function of an Intrusion Prevention System (IPS)?

To monitor network traffic and block malicious activity.

37
New cards

What does SSL stand for in network security?

Secure Sockets Layer.

38
New cards

What is the role of a Load Balancer in networking?

To distribute network or application traffic across multiple servers to optimize resource use.

39
New cards

What kind of attacks does an Intrusion Detection System (IDS) protect against?

It protects against suspicious activity on the network and alerts administrators.

40
New cards

What is the primary function of Encryption?

To convert information or data into a code to prevent unauthorized access.

41
New cards

What type of network is a Demilitarized Zone (DMZ)?

A separate network located outside the secure network perimeter.

42
New cards

What distinguishes a Virtual LAN (VLAN)?

It allows scattered users to be logically grouped together despite physical separation.