2
ISC2 Certified in Cybersecurity Chapter 4 Network Security
|| || || || || || || ||
Part 1 Exam with accurate answers
|| || || || ||
Two or more computers linked together to share data, information or resources.
|| || || || || || || || || || ||
A Network
||
Physical parts of a computer and related devices.
|| || || || || || ||
Hardware
Computer programs and associated data that may be dynamically written or modified during
|| || || || || || || || || || || || ||
execution. NIST SP 80-37 Rev. 2 || || || || ||
Software
A set of rules (formats and procedures) to implement and control some type of association (that is,
|| || || || || || || || || || || || || || || ||
communication) between systems. NIST SP 800-82 Rev. 2
|| || || || || || || ||
Protocols
The process and act of converting the message from its plaintext to cipher text. Sometimes it is
|| || || || || || || || || || || || || || || || ||
also referred to as enciphering. The two terms are sometimes used interchangeably in literature
|| || || || || || || || || || || || || ||
and have similar meanings.
|| || ||
Encryption
,2
A network typically spanning a single floor or building. This is commonly a limited geographical
|| || || || || || || || || || || || || || ||
area.
Local Area Network (LAN)
|| || ||
Long-distance connections between geographically remote networks.
|| || || || ||
Wide Area Network (WAN)
|| || ||
Wired device not as smart as switches or routers.
|| || || || || || || ||
Hub
Wired devices that know the addresses of the devices connected to them and route traffic to that
|| || || || || || || || || || || || || || || || ||
port/device rather than retransmitting to all devices.
|| || || || || ||
Switch
This transmission is a one-to-many form of sending internet traffic.
|| || || || || || || || ||
Broadcast
A logical group of workstations, servers, and network devices that appear to be on the same LAN
|| || || || || || || || || || || || || || || || ||
despite their geographical distribution.
|| || ||
Virtual Local Area Network (VLAN)
|| || || ||
, 2
Used to control traffic flow on networks and are often used to connect similar networks and
|| || || || || || || || || || || || || || || ||
control traffic flow between them. Can be wired or wireless and they determine the most efficient
|| || || || || || || || || || || || || || || ||
direction for traffic to flow across the network.|| || || || || || ||
Router
Network device used to filter traffic. || || || || ||
Firewall
This is typically deployed between a private network and the internet, but it can also be deployed
|| || || || || || || || || || || || || || || || ||
between departments (segmented networks) within an organization (overall network).
|| || || || || || || ||
Firewall
These filter traffic based on a defined set of rules, also called filters or access control lists.
|| || || || || || || || || || || || || || || ||
Firewall
A computer that provides information to other computers on a network.
|| || || || || || || || || ||
Server
All of these are, by design, networked and accessed in some way by a client computer.
|| || || || || || || || || || || || || || ||
Server
ISC2 Certified in Cybersecurity Chapter 4 Network Security
|| || || || || || || ||
Part 1 Exam with accurate answers
|| || || || ||
Two or more computers linked together to share data, information or resources.
|| || || || || || || || || || ||
A Network
||
Physical parts of a computer and related devices.
|| || || || || || ||
Hardware
Computer programs and associated data that may be dynamically written or modified during
|| || || || || || || || || || || || ||
execution. NIST SP 80-37 Rev. 2 || || || || ||
Software
A set of rules (formats and procedures) to implement and control some type of association (that is,
|| || || || || || || || || || || || || || || ||
communication) between systems. NIST SP 800-82 Rev. 2
|| || || || || || || ||
Protocols
The process and act of converting the message from its plaintext to cipher text. Sometimes it is
|| || || || || || || || || || || || || || || || ||
also referred to as enciphering. The two terms are sometimes used interchangeably in literature
|| || || || || || || || || || || || || ||
and have similar meanings.
|| || ||
Encryption
,2
A network typically spanning a single floor or building. This is commonly a limited geographical
|| || || || || || || || || || || || || || ||
area.
Local Area Network (LAN)
|| || ||
Long-distance connections between geographically remote networks.
|| || || || ||
Wide Area Network (WAN)
|| || ||
Wired device not as smart as switches or routers.
|| || || || || || || ||
Hub
Wired devices that know the addresses of the devices connected to them and route traffic to that
|| || || || || || || || || || || || || || || || ||
port/device rather than retransmitting to all devices.
|| || || || || ||
Switch
This transmission is a one-to-many form of sending internet traffic.
|| || || || || || || || ||
Broadcast
A logical group of workstations, servers, and network devices that appear to be on the same LAN
|| || || || || || || || || || || || || || || || ||
despite their geographical distribution.
|| || ||
Virtual Local Area Network (VLAN)
|| || || ||
, 2
Used to control traffic flow on networks and are often used to connect similar networks and
|| || || || || || || || || || || || || || || ||
control traffic flow between them. Can be wired or wireless and they determine the most efficient
|| || || || || || || || || || || || || || || ||
direction for traffic to flow across the network.|| || || || || || ||
Router
Network device used to filter traffic. || || || || ||
Firewall
This is typically deployed between a private network and the internet, but it can also be deployed
|| || || || || || || || || || || || || || || || ||
between departments (segmented networks) within an organization (overall network).
|| || || || || || || ||
Firewall
These filter traffic based on a defined set of rules, also called filters or access control lists.
|| || || || || || || || || || || || || || || ||
Firewall
A computer that provides information to other computers on a network.
|| || || || || || || || || ||
Server
All of these are, by design, networked and accessed in some way by a client computer.
|| || || || || || || || || || || || || || ||
Server