A unique numerical identifier assigend to each device on the network
IP address
what type of controls are bollards, barricades, and fences
Physical
What protocol runs on port 3389 and is it secure =?
remote desktop protocol RDP
this malware is commonly found in .docx files
macro
NIST
National Institute of Standards and Technology
device that forwards packets between networks
router
what is the first layer of defense in a network
firewall
name layer 5 of the OSI model
session
this type of malware displays unwanted ads on your system
adware
XSS
Cross Site Scripting
what model has 7 layers and is used to understand how networks communicate
OSI model
least privilege access
what service runs on port 21
Telnet
an infected network of computers
botnet
SPI
Stateful packet inspection
a network that spans a large geographical area
WAN Wide Area Network
a control that ensures users are who they say they are
authentication
the protocol is used to access pages on the internet
HTTP
an attack against networks or network services to bring them down
Dos or DDoS
CVE
common vulnerability and exploit
a network limited to a small geographic area
Lan local area network
the control that assumes no user or device should be automatically trusted
zero trust
protocol used to send emails
SMPT Simple Mail Transfer Protocol
malware that hides persistence to avoid detection (super advanced)
rootkit
FTP
File Transfer Protocol