A room between two security doors that verifies authorization.
What is an Access Control Vestibule?
Authentication method using physical characteristics like fingerprints.
What is Biometrics?
– A short-range wireless protocol that connects devices within 30 feet.
What is Bluetooth?
Document outlining acceptable use of company resources.
What is an AUP (Acceptable Use Policy)?
Malware that encrypts files and demands payment for decryption.
What is Ransomware?
– A list defining who can access resources and what permissions they have.
What is an ACL (Access Control List)?
Windows feature that encrypts an entire hard drive for protection.
What is BitLocker?
A device that filters network traffic based on rules.
What is a Firewall?
Formal documentation of incidents and investigations.
What is an Incident Report?
Software that secretly gathers user data.
What is Spyware?
Centralized system for managing users, rights, and permissions.
What is Active Directory?
A two-step verification system requiring multiple authentication factors.
What is MFA (Multifactor Authentication)?
– A network type that uses encryption for secure remote access.
What is a VPN (Virtual Private Network)?
– Step-by-step guide outlining how to perform a process.
What is an SOP (Standard Operating Procedure)?
Attack that uses dictionary words to guess passwords.
What is a Dictionary Attack?
An app that removes malicious software from a system.
What is Antimalware?
The act of giving minimum rights needed for job performance.
What is the Principle of Least Privilege?
A system used to detect and deter unauthorized entry into a building.
What is an Alarm System?
A process for verifying authorization when entering secure areas.
What is Access Control?
An attacker pretending to be a legitimate person or system.
What is Impersonation?
– A protocol that securely encrypts data between two devices.
What is SSH (Secure Shell)?
A system that locks accounts after multiple failed login attempts.
What is Failed Attempts Lockout?
A tool used to block unwanted online ads or pop-ups.
What is an Ad Blocker?
The written form used to request or document system changes.
What is a Request Form?
Using Voice over IP to obtain personal information fraudulently.
What is Vishing?