This protocol is commonly used to securely transmit data over the internet by encrypting it.
What is "HTTPS"?
This type of software scans and removes malicious software from a computer system.
What is "antivirus"?
This type of attack involves tricking individuals into disclosing confidential information by pretending to be a trustworthy entity.
What is "phishing"?
This common cybersecurity practice involves using a combination of letters, numbers, and symbols to protect access to accounts and systems.
What is a "password"?
WHat is the primary function of a DNS server in a network?
What is "to resolve domain name to IP addresses"?
This type of firewall operates at the application layer and is used to filter traffic based on specific applications or services.
What is an "application firewall"?
This term describes a software flaw that can be exploited by attackers to compromise a system or application, often leading to security breaches.
What is a "vulnerability"?
This term describes a security measure that requires users to provide two or more forms of identification before accessing an account or system.
What is "two-factor authentication (2FA)"?
This protocol is used to automatically assign IP addresses to devices on a network.
What is "DHCP (Dynamic Host Configuration Protocol)"?
This open-source tool is widely used for penetration testing and vulnerability scanning.
What is "Kali Linux"?
This type of malware encrypts the victim's files ad demands payment for the decryption key.
What is "ransomware"?
This security principle involves separating different components of a system to limit the potential impact of a security breach.
What is "network segmentation"?
What is "TCP is connection oriented and reliable, while UDP is connectionless and faster"?
This tool provides a secure way to access a remote network by creating an encrypted tunnel over the internet.
What is a "Virtual Private Network (VPN)"?
This type of attack targets a system's availability by overwhelming it with excessive traffic, rendering it unusable to legitimate users.
What is a "Denial of Service (DoS) attack"?
This term refers to the process of regularly updating software to fix vulnerabilities and improve security.
What is "patch management"?
This network device operates at the data link layer and is used to segment a network into collision domains.
What is a "switch"?
This type of tool is used to track and log user activity on a network to detect potential security breaches.
What is a "security information and event management system (SIEM) system"?
This attack involves intercepting and altering communications between two parties without their knowledge, often used to steal sensitive information.
What is a "man-in-the-middle attack"?
This concept refers to the principle of limiting access to information and resources to only those who need it to perform their job functions.
What is "least privilege"?