DNS is associated with this
What is servers?
The four type of cloud services
What is Iaas, Paas, Saas, Xaas?
Definition of Evil Twin
What is pretend to be a legitimate network?
Steps to securing an application
What is data minimization, salting, hashing, and data tokenization?
Definition of proxy server
What is to accept and forward requests?
The secure protocol of HTTP
What is HTTPS?
Virtualized servers do this
What is act like real servers?
Types of Wireless connectivities
What is wi-fi, NFC and RFID, and Infrared?
Definition of SQL injection
What is the attacker is able to provide input to the web application und then monitor the outputs?
Difference between IDS and IPS
What is IDS detects threats and IPS blocks threats?
The secure protocol that uses SSH
What is SFTP?
Difference between Type 1 and Type 2 Hypervisor
What is Type 1 hypervisor is directly connected to hardware and the Type 2 hypervisor is not?
Jamming attacks cause this
What is Denial of Service?
Ways to exploit trust and execute code
What is request forgery and server side request forgery?
Used to prevent low availability on the network
What is Load balancer?
Original port for Telnet
What is TCP 23?
Cloud service providers
What is GCP, AWS, and Azure?
Steps to secure the network
What is identifying wireless networks and access points and signals strengths, cryptographic and authentication protocols, aps must be configured to log and report on the report, and use both deployment methods and admin tools?
An application allows reflected input.
What is reflected cross-site scripting
The more secure and reliable firewall.
What is stateful firewalls?
RTP original port
What is VDP 16384-32767?
IoT definition
What is any physical device that can connect to the internet?
Difference between blue jacking and blue snarfing
What is blue jacking is sending unsolicited messages to bluetooth devices and blue snarfing is stealing contacts and other data?
Ways that credential stealing attacks can happen
What is social engineering, malware, automated attacks, and application vulnerabilities?
Purpose of content filters
What is to block traffic based on content rules?