Type of attack that uses every special character, lower case, upper case, number, symbol, etc to crack a password.
Brute Force Attack
Knowing a risk exists but choosing to do nothing about it.
Risk Acceptance
Password, PIN, Passcode
Something You Know
Physical Device that provides a secure connection between end devices. The virtual circuits provide a 1 :1 secure connection which also improves network efficiency. It also uses the devices MAC address as an identifier.
Switch
What class is 192.168.10.12
Class C
Type of attack that uses the most commonly used words or phrases to crack a password.
Dictionary Attack
Choosing to disengaged in the action that causes you the risk ultimately losing the benefits you receive from performing that same action as well.
Risk Avoidance
Badge Card, RFID Card, Physical Key
Something You Have
This device sometimes wireless provides IP addresses to the devices connecting to it. It is the gateway between your home or office network and the internet.
Router
What class is 10.0.0.1
Class A
This is the combination of two or more password attack techniques.
Hybrid Attack
To threaten or warn adversary if they retaliate harm will come their way.
Risk Deterrence
Fingerprint or Retinal Scan, Face or Voice Recognition
Something You Are
This hardware or software component is your networks first line of defense when comes to defending against unwanted web traffic.
Firewall
What class is 172.110.45.3
Class B
This type of attack relies on the fact that 2 different inputs can create the same output as a hashed algorithm due to the nature of its fixed bit response.
Birthday Attack
Sharing the risk burden with a third party as a form of insurance.
Risk Transference
Using two or more Authentication methods to strengthen you security posture.
Multifactor Authentication or 2FA
This device converts analog signals from your ISP to digital signals needed to provide WiFi for you home network.
Modem
What type address is 00-1A-B5-37-FF-0C
MAC Address
A precomputed list that contains the password hash value for each plain text character. Because these are the most commonly used hashes this can significantly reduce the time to crack hashed passwords.
Rainbow Table
Taking steps to reduce risks by making it more manageable through steps to lessen the impact.
Risk Mitigation
The use of special characteristics that are unique to your inherent/physical features. Not the factor of authentication, but what is the specific name for these biological features
Biometrics
This physical device is unsecure by nature, broadcasts its signal to every device connected to it. Using MAC addresses to identify each end device it still had efficiency problems due to collisions caused by repeating request.
Hub
What class is 239.220.68.240
Class D