This attack tricks users into clicking links or opening files that launch attacks.
What is phishing?
This is the strongest authentication method.
What is multifactor authentication?
This principle provides necessary access while denying unnecessary access.
What is the principle of least privilege?
This algorithm uses the same key to encrypt and decrypt data.
What is a symmetric algorithm
This is malicious software that infiltrates a computer/
What is malware?
When considering access control, this is the resource being accessed.
What is an object?
This term describes what a user can do to an object.
What is permission?
This delivers a trusted public key to verify ownership.
What is a digital certificate?
This type of malware appears to be a useful program but is actually malicious.
What is a Trojan horse?
Mobile devices, PCs, and laptops are examples of this.
What is a client?
A security strategy that requires multiple controls be compromised to exploit any vulnerability is referred to as this.
What is defense in depth?
This identifier is stored in the Security Access Token (SAT).
What is a Security identifier (SID)?
This is the built-in Windows tool for encrypting entire volumes.
What is BitLocker?
An attack where no fix is available yet
What is a zero-day attack?
This action/attack collects network traffic messages.
What is packet sniffing?
Non-kernel programs run in this mode.
What is user mode?
This infrastructure model protects data in transit in Windows.
What is Public Key Infrastructure (PKI)?
Who a certificate request is submitted to.
What is a Registration authority (RA)?
This anti-malware component scans incoming data in real time.
What is a shield?
This device provides specific services to client applications directly or indirectly.
What is a server?
This microkernel process relates to program/process management?
What is CPU scheduling?
This Windows Server feature allows auditors to discover who accessed sensitive data.
What is dynamic access control (DAC)?
Which Windows tool encrypts removable drives like USBs or external disks.
What is BitLocker To Go?
The antivirus software type that relies on identifying malware based on previous experience.
What is heuristic antivirus software?