This feature checks a user’s identity before allowing access to a network or system.
What is authentication?
This device or software filters incoming and outgoing traffic based on security rules.
What is a firewall?
This protocol is used to securely send email from a client to a mail server.
What is SMTP?
A student tries several wrong passwords and then gets locked out of the account. What security measure caused this?
What is account lockout?
This type of malware pretends to be legitimate software in order to trick users.
What is a Trojan horse?
This feature limits what a user can see or do on a network based on their role or permissions.
What is access control?
This solution monitors network traffic for suspicious activity and alerts administrators.
What is an IDS or intrusion detection system?
This protocol is used to securely connect to and manage remote devices over a network.
What is SSH?
A security team reviews records showing which users logged in, what files they opened, and when those actions happened. What network security feature are they using?
What is an audit trail?
This attack attempts to overwhelm a network or server with too much traffic.
What is a DDoS attack?
This security feature scrambles data so unauthorized users cannot read it.
What is encryption?
This security solution can detect and actively block attacks in real time.
What is an IPS or intrusion protection system?
This protocol is commonly used to secure website traffic by combining HTTP with encryption.
What is HTTPS?
A school blocks certain websites for students based on safety rules. What security device or solution is likely doing this?
What is a firewall?
This principle means giving users only the access they need to do their jobs.
What is the principle of least privilege?
This feature keeps a record of user activity and security events for review.
What is logging?
This solution allows employees to securely access a private network from a remote location.
What is a VPN or virtual private network?
This wireless security protocol replaced WPA and improves protection for Wi-Fi networks.
What is WPA3?
A network administrator receives an alert that unusual traffic patterns may indicate an attack, but the traffic is not blocked automatically. What tool detected it?
What is an IDS?
This type of attack tricks users into revealing passwords or personal information through fake messages or websites.
What is phishing?
This feature automatically signs a user out after a period of inactivity.
What is session timeout?
This solution scans files and systems for malicious software.
What is antivirus?
This protocol encrypts email in transit between mail servers.
What is TLS?
A user must enter a password and then a code from a phone app to log in. What security feature is this?
What is multi-factor authentication (MFA)?
This process identifies weaknesses in a system before attackers can exploit them.
What is a vulnerability scan?