Wi-Fi? Because-Fi
Acronyms
Microsoft 365
Threats
Security
100

This Wi-Fi frequency band is slower than 5 GHz but offers better range and penetrates walls more effectively.

What is 2.4 GHz Wi-Fi?

100

This network protocol automatically assigns IP addresses and other network configuration settings to devices on a network.

What is Dynamic Host Configuration Protocol (DHCP)?

100

This type of group is used to send email to multiple recipients at once but doesn’t have its own mailbox for storing messages.

What is a distribution group?

100

This type of attack tricks users into revealing sensitive information, like passwords or credit card numbers, often through fraudulent emails or websites.

What is phishing?

100

Attackers will use this principle—manipulating trust, urgency, or authority—to exploit human security holes and gain access without relying on technical vulnerabilities.

What is social engineering?

200

This now antiquated encryption protocol is commonly referred to as WEP.

What is Wired Equivalent Privacy?

200

This system translates human-friendly domain names like example.com into IP addresses that computers use to locate each other on the internet.

What is the Domain Name System (DNS)?

200

Administrators go to this portal to review users’ sign-in activity, including successful, failed, and risky login attempts.

What is the Entra Admin Center/Azure Active Directory Sign-ins page?

200

This type of malware encrypts a victim’s files and demands payment, usually in cryptocurrency, to restore access.

What is ransomware?

200

This network segment sits between an internal network and the internet, hosting public-facing servers while keeping the internal network isolated and protected.

What is a DMZ (Demilitarized Zone)?

300

This protocol allows users to connect to Wi-Fi securely by verifying their credentials through a central server rather than locally.

What is Radius Authentication?

300

This Microsoft service stores information about users, computers, and other resources in a network and allows administrators to manage permissions and access centrally.

What is Active Directory?

300

This Microsoft 365 feature lets administrators enforce policies that grant or block access to resources based on conditions like user location, device state, or risk level.

What is Conditional Access?

300

This attack tries many username and password combinations repeatedly until the correct one is found, often automated with tools that test lists of credentials.

What is a brute‑force attack?

300

This security principle recommends giving users only the minimum permissions they need to perform their job, reducing the risk of accidental or malicious access.

What is the Principle of Least Privilege?

400

This name, broadcast by a wireless router, identifies a Wi-Fi network so devices can find and connect to it.

What is an SSID?

400

This technology creates a secure, encrypted connection over the internet, allowing remote users to access a private network safely.

What is a Virtual Private Network (VPN)?

400

This Microsoft 365 portal lets administrators audit user and admin activity, manage retention policies, and monitor data compliance across the organization.

What is Microsoft Purview?

400

This term describes techniques where an attacker falsifies information—like an IP address, email sender, or caller ID—to masquerade as a trusted source.

What is spoofing?

400

This type of backup cannot be altered or deleted for a set period of time, protecting client data from ransomware and accidental or malicious changes.

What are immutable backups?

500

Instead of relying on a single router, this type of network uses multiple nodes placed around a home or office to provide seamless wireless coverage.

What is a mesh Wi-Fi network?

500

Adds an extra layer of security by requiring more than just a password to log in.

What is Multi-Factor Authentication (MFA)?

500

This Microsoft 365 service allows administrators to manage and secure company devices, deploy apps, and enforce compliance policies across PCs and mobile devices.

What is Microsoft Intune?

500

Rather than deploying custom malware, attackers using this tactic abuse built‑in OS tools like PowerShell, or certutil to move laterally and maintain persistence.

What are living‑off‑the‑land attacks?

500

This publicly disclosed identifier is assigned to a known software vulnerability so security teams can track, patch, and discuss it consistently.

What is a CVE (Common Vulnerabilities and Exposures)?