Click this in your browser to see the security and certification status of a webpage
What is the padlock icon?
The windows shortcut to lock your computer
What is Win-L?
Used to prevent vehicles from accessing a property or area otherwise not allowed
What are bollards?
Networking device responsible for connecting networks to each other
What is a router?
The weakest link in any company's security
What is a user?
These are often in control of a botnet responsible for DDOS attacks on websites
What is a C2 or Command and Control server?
This is implemented to ensure that all work is put away and no sensitive information is left accessible
What is a clean desk policy?
Use these to ensure only one person enters a premises at a time with the opportunity to identify them while inside this
What is an access control vestibule?
This service should be disabled if not used, runs on routers to automatically configure port forwarding rules, associated with many vulnerabilities
What is UPNP universal plug and play?
What is social engineering?
Once you have quarantined an infected system, you should do this (at least in Windows)
What is Disable system restore points?
This is what happened when someone is able to see your screen without your knowledge (just the act described guys)
What is shoulder surfing?
The most flexible security control you can ever have
What is a security guard?
You do this to expose an internal network port through the router to the outside network ie the internet
What is port forwarding?
No longer used as a wireless protection method; the encryption behind this was broken and this was the earliest consumer wifi protection
What is WEP? Wired Equivalent Protection
You were called to training because you opened an email that you thought was legitimate from a former coworker of yours
What is anti-phishing training?
These are electronic tokens that give access to entryways in buildings
What are smart cards or key fobs?
The primary purpose of a camera system that records
What is detect?
Enable and configure this on a router to allow or deny devices from your network based on known MAC addresses
What is MAC filtering?
You need to do these things to harden your networking devices (name 3)
What is change default passwords, update firmware, disable unused ports logical and physical, disable unused services, use implicit deny in your ACL...
A user calls you reporting malware, this is the very first thing you should do when responding to the call
What is verify the infection?
These take your fingerprint, palmprint, retina or iris scan to unlock a device or doorway
What is a biometric scanner?
Use one of these at an entry point to detect the possible presence of weapons on people entering your facility
What is a magnetometer?
We use these to create security zones or segments within a network, with the goal of controlling access to networks and data
What is a screened subnet/dmz?
This physical button should be disabled to prevent unauthorized access to your network
What is WPS?