This Cisco IOS command prevents passwords from being saved in plaintext in the running configuration.
What is service password‑encryption?
This operating system developed by Microsoft uses the NT kernel.
What is Windows?
This security principle states that users and systems should have only the minimum access needed to do their job.
What is the Principle of Least Privilege?
This authorized form of hacking is performed to identify vulnerabilities before attackers do.
What is penetration testing?
This security model focuses on protecting confidentiality, integrity, and availability.
What is the CIA Triad?
This IPv6 address is the equivalent of the IPv4 loopback address 127.0.0.1.
What is ::1?
This open‑source operating system kernel is the foundation of distributions like Ubuntu and Fedora.
What is Linux?
This type of attack tricks users into revealing sensitive information through deceptive emails or messages.
What is phishing?
This phase of an attack focuses on gathering information about a target without directly interacting with it.
What is passive reconnaissance?
This term describes the potential for loss when a threat successfully exploits a vulnerability.
What is risk?
This Cisco IOS command allows a router interface to automatically obtain its IP address from a DHCP server.
What is ip address dhcp?
This Windows tool is used to view running processes, CPU usage, and memory consumption.
What is Task Manager?
This device or software filters incoming and outgoing network traffic based on security rules.
What is a firewall?
This term describes a weakness in software, hardware, or configuration that can be exploited.
What is a vulnerability?
This strategy layers multiple security controls so that no single failure results in a full compromise.
What is defense in depth?
OSPF selects routes by dividing a reference bandwidth of 100 Mbps by the interface bandwidth to produce this value.
What is OSPF cost?
This Linux command displays running processes in real time and updates continuously.
What is top?
This defensive software detects, blocks, and removes malicious code from computers.
What is antivirus software?
This attack technique manipulates people rather than systems to gain access to sensitive information.
What is social engineering?
This offensive‑to‑defensive framework categorizes adversary behavior into tactics, techniques, and procedures.
What is the MITRE ATT&CK framework?
This best practice improves performance when deploying multiple 802.11b wireless access points close to each other.
What is allocating non‑overlapping channels?
This is the default file system for modern versions of Windows.
What is NTFS?
This security method requires two or more forms of verification before granting access.
What is multi‑factor authentication (MFA)?
This offensive security concept describes blending malicious activity into normal system and user behavior to evade detection.
What is living off the land (LotL)?
This security model assumes no user or system should be trusted by default, even inside the network.
What is Zero Trust?