Passwords/MFA
Attacks
Network Media
Network Security
Policy
100

The use of an upper case, lower case, number and special character is called what?

Password Complexity

100

A type of malware that prevents a system from being used until money is transferred to the attacker

Ransomware

100

The type of device you can access your smart fridge from work with and have it order you groceries

IoT Device (Internet of Things)

100

Will detect malicious traffic and send you a warning

IDS (Intrusion Detection System)

100

A policy that defines how users use I.T. resources at a company

Acceptable Use Policy (AUP)

200

A collection of words that is more secure than a standard password

Passphrase

200

Malware that self replicates and spreads

Worm
200

Best network media to cover large distances

Fiberoptics

200

The technology used to create a tunnel from your company through the internet to your device to prevent unauthorized access to your server

VPN

200

A policy preventing employees from writing down passwords or other confidential information on their desks

Clean Desk Policy

300

The requirement of a password plus a fingerprint is called what?

Multifactor Authentication

300

An attack that slows the network connection down between two points

Man-in-the-middle

300

Capable of reaching 10gbps speeds

Cat6

300

Will react to malicious traffic automatically

Intrusion Prevention System

300

A concept where a user only has access to the appropriate network resources

Principle of least privilege
400

A type of password that uses a physical attribute

Biometric Password

400

A customized phishing attack against a specific individual or organization

Spear phishing

400
The most secure ethernet media

Fiberoptics

400

A fake network or system that hosts false information but responds as a real system. Used to diagnose and prevent attacks.

Honeypot

400

A contract you have to sign if both parties agree not to share confidential information

NDA (Non-Disclosure Agreement)

500
Writing your password down on a sticky note but throwing it out could lead to what security vulnerability?

Dumpster Diving

500

Infiltrates a web application by manipulating SQL

SQL Injection

500
To help prevent attacks against your wireless network, you could stop broadcasting this

SSID (Network name)

500

To protect employees using a BYOD device, a network admin would provide them this to ensure secure transmission of data

SSL(Secure Socket Layer) Certificate

500

Use of deception to divert company assets or profits to an employee

Fraud

M
e
n
u