Network devices correct answers Switches, routers, and firewalls with access to data
Compromised device correct answers Device accessed by a malicious user or attacker
Wireless networks correct answers Networks vulnerable to attackers in close proximity
Hardening correct answers Process of...
Unnecessary services correct answers Optional features that increase the risk of attack
Patching correct answers Installing security updates to fix vulnerabilities
Physical access correct answers Ability to physically interact with a device
Trusted network correct answers Network authorized to make changes to a device
Wireless network encryption correct answers Configuring WPA2 or WPA3 for secure traffic
Audit logs correct answers Records of device activity for analysis and detection
Backup correct answers Creating copies of device configurations for restoration
Authentication correct answers Process of confirming a person's identity
Microsoft Active Directory correct answers Authentication system that confirms user identity via
passwords
Public Key Infrastructure (PKI) correct answers Authentication system that uses certificates to
validate website identity
Authorization correct answers Determines what a user may access after authentication
Restrictive Permissions correct answers Applying limited access to data and securing servers and
network devices
Data Leaks correct answers Risk of unauthorized access to confidential data
, Malware Infection correct answers Accidental infection of network data files by a user's infected
computer
AAA Interaction correct answers Client communication with a radius server via the cloud
Accounting correct answers Process of verifying access control settings and providing a forensic
trail
Immutable Logs correct answers Audit logs stored in an unchangeable form to prevent tampering
MFA correct answers Multi-factor authentication, an optional add-on to the authentication
process
2FA correct answers Another term for multi-factor authentication
PIN correct answers Personal Identification Number used as part of multi-factor authentication
Biometric Scan correct answers Facial, retinal, or fingerprint scan used for multi-factor
authentication
Touch ID correct answers Fingerprint scan used for authentication on Apple devices
Face ID correct answers Facial recognition scan used for authentication on Apple devices
Proximity-based Security correct answers Automatic unlocking of devices when in close range
Windows Hello correct answers Mechanism on Microsoft Windows computers using fingerprint
or facial recognition
Wireless network attacks correct answers Attacks on wireless networks that can be done
remotely
Denial of Service (DoS) attack correct answers An attack that enables unauthorized access and
traffic monitoring of a wireless network
Deauth attack correct answers A denial-of-service (DoS) attack where the attacker can force
clients off a network
WPA3 security correct answers A security protocol that encrypts management packets in a
wireless network
WPA2 security correct answers A security protocol that encrypts data traffic in a wireless
network
Fake Access attack correct answers An attack where an attacker sets up an illegitimate wireless
network to intercept data
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.29. You're not tied to anything after your purchase.