These short, sturdy posts are used to block vehicles from entering secure areas.
What are bollards?
A router rule explicitly permits HTTPS traffic while denying all other inbound connections.
What is an access control list (ACL)?
This MFA method sends a one-time code to a user’s email for login verification.
What are email authentication codes?
This basic router hardening step prevents attackers from using well-known factory credentials.
What is changing default passwords?
Disabling this feature hides the wireless network name from casual discovery tools.
What is SSID broadcast?
Alvin uses this security type to allow access to his server room, he requires your hand and eye to be scanned.
What is Biometrics?
This system manages user identities, roles, and access permissions across an organization.
What is IAM (Identity and Access Management)?
This MFA method uses an app on a smartphone to generate time-based codes.
What are authenticator applications?
This router feature allows or blocks traffic based on source or destination IP addresses.
What is IP filtering?
This outdated wireless encryption standard can be cracked in minutes and should never be used.
What is WEP?
This security device detects metal objects on a person to help prevent weapons from entering a secure area.
What is a magnetometer?
A help-desk technician can reset passwords but cannot install software or access payroll systems.
What is the principle of least privilege (PoLP)?
An employee inserts a USB device that generates login codes without needing internet access.
What is a hardware token?
This router feature automatically opens ports for applications but increases security risk if enabled.
What is Universal Plug and Play (UPnP)?
This action helps prevent attackers from using default network names to identify router models.
What is changing the SSID?
This small electronic device is often used for keyless entry and proximity-based authentication.
What are key fobs?
A company requires continuous verification of users, devices, and location—even after successful login.
What is the Zero Trust model?
An organization remotely wipes a lost company smartphone and enforces screen-lock policies.
What is MDM(Mobile Device Management)?
This network segment hosts public-facing servers while isolating them from the internal LAN.
What is a screened subnet (DMZ)?
A wireless network uses strong encryption but shares one password among all employees.
What is WPA2-PSK or WPA3-SAE (Simultaneous Authentication of Equals)?
This secured entry area prevents tailgating by allowing only one person through at a time.
What is an Access Control Vestibule (Mantrap)?
This individual rule inside an access control list allows or denies permissions for a specific user or group.
What is an Access Control Entry (ACE)?
A system blocks users from emailing files that contain credit card numbers.
What is DLP (Data Loss Prevention)?
This firewall feature directs external traffic on a specific port to an internal device.
What is port forwarding or port mapping?
This wireless configuration allows visitors internet access while isolating them from internal devices.
What are guest accounts or guest networks?