A Method of being able to visually see who is coming and going without being in the room.
What is Video Surveillance?
Uses Advanced Encryption Standard.
What is WPA2?
The best way to prevent device infection.
What is User-Education?
This is a fraudulent email pretending to be from a legitimate source in order to get information from a user.
What is phishing?
Change default credentials.
What is the first thing to do when setting up a SOHO?
An Authentication method that authenticates based on two or more different kind of authentication
What is MFA?
An encryption method used for wireless networks.
What is Advanced Encryption Standard (AES)?
This malware locks down data and files in order to exploit a company/user into paying the hacker money to unlock the data and files.
What is Ransomware?
This is a fraudulent call to get information from a user.
What is Vishing?
SSID (Service Set Identifier).
What is the network identifier that broadcasts out to devices.
Concepts like security policies and software safeguards that are used to protect systems
What is logical security?
This centralized authentication and accounting.
What is Remote Authentication Dial-In User Service (RADIUS)?
What is a Keylogger?
This is when two identical SSID's are visible to a user to steal information over wifi.
What is an Evil Twin?
Placing ____ in the center of the office space on or close to the ceiling disperses the radio waves to cover the whole office evenly.
What is a router/WAP?
This is used to specify which traffic should be allowed through a firewall and which should be blocked.
What is an ACL (Access Control List)?
An open standard for authentication that is used in conjunction with AD for Authentication.
What is Kerberos?
This virus infects the master boot record of a drive and is designed to load when a device is booted up, thus reinfecting the OS each time.
What is a Boot Sector Virus?
This is when an exploit has not been discovered or has been discovered but not yet patched out.
What is a Zero-Day Attack?
A protocol that is designed to make connecting to a wifi router easier by automatically connecting devices without the need for configuration.
What is Universal Plug and Play (UPnP)?
A software that is used to enforce security measues on mobile devices, such as cell phones, tablets, and laptops.
What is MDM (Mobile Device Management)?
introduced 192-bit cryptographic strength in Enterprise mode and requires CCMP 128 as a minimum in personal mode
What is WPA3?
This is designed to trick a user into believing their computer is infected with a virus.
What is scareware?
This is used to embed malicious scripts into a legitimate web page.
What is XSS (Cross-Site Scripting)?
Disabling this will prevent data packets from automatically being received by a device, sometimes without you knowing.
What is port fowarding?