This protocol runs on SSH to provide file system functionality and transferring capabilities
What is Secure File Transfer Protocol (SFTP)?
Gaining root access to the operating system in an Apple device is known as this
What is Jailbreaking?
Rainbow table attacks can be stopped by using this process of adding characters to a password before it is hashed
What is Salting?
Jeff’s company uses AWS servers to host their network and applications. Jeff’s company is using this kind of cloud model
What is Public Cloud?
This type of Wi-Fi Protected Access (WPA) is the most secure, introducing the process of Simultaneous Authentication of Equals (SAE) to fix past vulnerabilities
What is WPA3?
Joe plans to have a video call with his manager and wants to make sure the conversation is private. This would be the best protocol for Joe to use
What is Secure Real Time Protocol (SRTP)?
If a device is ever lost, this can be done to remove all data from the device
What is Remote Wipe?
Although now known as a screened subnet, this was a portion of the network that provided security between your network and the Internet by giving public access to public resources
What is Demilitarized Zone (DMZ)?
Larry is a web developer intending to create a web app. This cloud service model would likely be the best solution
What is Platform as a Service (PaaS)?
This type of firewall examines every packet regardless of any history
What is Stateless Firewall?
Flo uses this protocol in her VPN to connect sites over a layer 3 network as if they were connected at layer 2
What is Layer 2 Tunneling Protocol (L2TP)?
Edward is only able to login when he is within 10 miles of the company office, demonstrating this concept
What is Geofencing?
In this system, the company chooses, buys, and owns the mobile device that an employee can use
What is Corporate Owned, Personally Enabled (COPE)?
In cloud computing, this is the ability to increase or decrease available resources as the workload changes
What is Elasticity?
This type of proxy is commonly used to protect and control user access to the Internet
What is Internal/Forward Proxy?
This protocol automatically assigns IP addresses and doesn't have built in security
What is Dynamic Host Configuration Protocol (DHCP)?
This form of wireless communication is commonly seen in mobile payment systems such as Apple Pay
What is Near Field Communication (NFC)?
Andy is a software engineer working on an application. He can use this concept to test the input validation on the login screen
What is Fuzzing?
These are isolated locations within a region for hosting cloud hardware
What are Availability Zones (AZ)?
James notices that his company’s load balancer sends traffic to server 1, then server 2, then server 3, and continually repeats this process. The load balancer is likely using this type of scheduling
What is Round-robin scheduling?
Po’s device needs a digital certificate while doing wireless authentication. Po is likely using this protocol to authenticate
What is Extensible Authentication Protocol - Transport Layer Security (EAP-TLS)?
This allows for both mobile and non-mobile devices to be managed using the same applications
What is Unified Endpoint Management (UEM)?
Traffic flowing within a data center is known as this
What is East-West traffic?
This cloud security solution can allow/disallow applications based on their JSON strings and API requests
What is Next-Gen SWG (Secure Web Gateway)?
Edward’s company VPN decrypts traffic when accessing the company network, but not when accessing non-company websites. Edward’s company is using this type of VPN tunnel
What is Split VPN tunnel?