is an unauthorized transfer of data to the outside world.
What is data leakage ?
network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
What is Firewall ?
is a security system that requires two separate, distinct forms of identification in order to access something
What is 2FA?
is a weak point in software code which can be exploited by a threat actor.
What is a vulnerability ?
is a computer security technology for removing potentially malicious code from files
What is Content Disarm and Reconstruction (CDR)?
is the combination of tools and technology used to secure, control and monitor access to an organization's critical information and resources.
What is Privileged access management (PAM)?
is a network device that connects two or more network segments. It is used to transfer information from the source to the destination.
What is a router?
is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials.
What is Single Sign-on SSO?
is a network security vulnerability in which malicious scripts are injected into websites. This attack occurs when attackers allow an untrusted source to inject code into a web application.
What is Cross-site scripting (XSS) ?
Is a host-based security measure that is used to restrict incoming and outgoing connections.
What is host-based firewall?
is simply a protocol to update or query Active Directory.
What is LDAP?
It is in the form of an add-in card and is installed on a computer so that the computer can be connected to a network.
What is Network Interface Card (NIC)?
What is Ethernet Card or Network Adapter?
is a security process that relies on the unique biological characteristics of individuals
What is biometric authentication ?
is a method to improve the security of a network. In this method, hackers fix vulnerabilities and weakness of computer or network.
What is Ethical hacking ?
is to allow only authorized and compliant systems onto the network.
What is NAC primary goal?
is an access control model where access is provided based on an individual's position in an organization. In these systems, predefined roles are associated with specific permissions.
What is Role-based access control (RBAC) ?
is widely used in network management for configuring network devices like switches, hubs, routers, printers, servers.
What SNMP is used for?
stores user information on client side and used for authentication, user preferences, and carrying information across multiple requests
What is a Cookie used for ?
is a type of malware which replicates from one computer to another.
What is a worm?
is the capability of a remote router or endpoint to connect to more than one network service.
What is split tunneling
is a list of permissions associated with a system resource (object)
What is Access-control list (ACL) ?
In Networking, when a task is in progress another task gets started before the previous task is finished.
Define Pipelining?
is a standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user
What is OAuth 2?
Name some tools used for packet sniffing / capturing ?
is used as the authentication server in an 802.1X implementation
What is RADIUS server used for?