Access Control
Network
Authentication
Penetration Testing
Endpoint security
100

is an unauthorized transfer of data to the outside world.

What is data leakage ?

100

network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules  

What is Firewall ?

100

 is a security system that requires two separate, distinct forms of identification in order to access something

What is 2FA?

100

is a weak point in software code which can be exploited by a threat actor.

What is a vulnerability ?

100

is a computer security technology for removing potentially malicious code from files

What is Content Disarm and Reconstruction (CDR)?

200

is the combination of tools and technology used to secure, control and monitor access to an organization's critical information and resources.

What is Privileged access management (PAM)?

200

is a network device that connects two or more network segments. It is used to transfer information from the source to the destination.

What is a router?

200

is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials.

What is Single Sign-on SSO?

200

is a network security vulnerability in which malicious scripts are injected into websites. This attack occurs when attackers allow an untrusted source to inject code into a web application. 

What is Cross-site scripting (XSS) ?

200

Is a host-based security measure that is used to restrict incoming and outgoing connections.

What is host-based firewall?

300

is simply a protocol to update or query Active Directory.

What is LDAP?

300

 It is in the form of an add-in card and is installed on a computer so that the computer can be connected to a network.

What is Network Interface Card (NIC)? 

What is Ethernet Card or Network Adapter? 

300

is a security process that relies on the unique biological characteristics of individuals

What is biometric authentication ?

300

is a method to improve the security of a network. In this method, hackers fix vulnerabilities and weakness of computer or network.

What is Ethical hacking ?

300

is to allow only authorized and compliant systems onto the network.

What is NAC primary goal?

400

is an access control model where access is provided based on an individual's position in an organization. In these systems, predefined roles are associated with specific permissions.

What is Role-based access control (RBAC) ?

400

is widely used in network management for configuring network devices like switches, hubs, routers, printers, servers.

What SNMP is used for?

400

stores user information on client side and used for authentication, user preferences, and carrying information across multiple requests

What is a Cookie used for ?

400

is a type of malware which replicates from one computer to another.

What is a worm?

400

is the capability of a remote router or endpoint to connect to more than one network service.

What is split tunneling

500

 is a list of permissions associated with a system resource (object)

What is Access-control list (ACL) ?

500

In Networking, when a task is in progress another task gets started before the previous task is finished.

Define Pipelining?

500

is a standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user

What is OAuth 2?

500
  • Tcpdump
  • Kismet
  • Wireshark
  • NetworkMiner
  • Dsniff

Name some tools used for packet sniffing / capturing  ?

500

is used as the authentication server in an 802.1X implementation

What is RADIUS server used for?

M
e
n
u