This Wi-Fi frequency band is slower than 5 GHz but offers better range and penetrates walls more effectively.
What is 2.4 GHz Wi-Fi?
This network protocol automatically assigns IP addresses and other network configuration settings to devices on a network.
What is Dynamic Host Configuration Protocol (DHCP)?
This type of group is used to send email to multiple recipients at once but doesn’t have its own mailbox for storing messages.
What is a distribution group?
This type of attack tricks users into revealing sensitive information, like passwords or credit card numbers, often through fraudulent emails or websites.
What is phishing?
Attackers will use this principle—manipulating trust, urgency, or authority—to exploit human security holes and gain access without relying on technical vulnerabilities.
What is social engineering?
This now antiquated encryption protocol is commonly referred to as WEP.
What is Wired Equivalent Privacy?
This system translates human-friendly domain names like example.com into IP addresses that computers use to locate each other on the internet.
What is the Domain Name System (DNS)?
Administrators go to this portal to review users’ sign-in activity, including successful, failed, and risky login attempts.
What is the Entra Admin Center/Azure Active Directory Sign-ins page?
This type of malware encrypts a victim’s files and demands payment, usually in cryptocurrency, to restore access.
What is ransomware?
This network segment sits between an internal network and the internet, hosting public-facing servers while keeping the internal network isolated and protected.
What is a DMZ (Demilitarized Zone)?
This protocol allows users to connect to Wi-Fi securely by verifying their credentials through a central server rather than locally.
What is Radius Authentication?
This Microsoft service stores information about users, computers, and other resources in a network and allows administrators to manage permissions and access centrally.
What is Active Directory?
This Microsoft 365 feature lets administrators enforce policies that grant or block access to resources based on conditions like user location, device state, or risk level.
What is Conditional Access?
This attack tries many username and password combinations repeatedly until the correct one is found, often automated with tools that test lists of credentials.
What is a brute‑force attack?
This security principle recommends giving users only the minimum permissions they need to perform their job, reducing the risk of accidental or malicious access.
What is the Principle of Least Privilege?
This name, broadcast by a wireless router, identifies a Wi-Fi network so devices can find and connect to it.
What is an SSID?
This technology creates a secure, encrypted connection over the internet, allowing remote users to access a private network safely.
What is a Virtual Private Network (VPN)?
This Microsoft 365 portal lets administrators audit user and admin activity, manage retention policies, and monitor data compliance across the organization.
What is Microsoft Purview?
This term describes techniques where an attacker falsifies information—like an IP address, email sender, or caller ID—to masquerade as a trusted source.
What is spoofing?
This type of backup cannot be altered or deleted for a set period of time, protecting client data from ransomware and accidental or malicious changes.
What are immutable backups?
Instead of relying on a single router, this type of network uses multiple nodes placed around a home or office to provide seamless wireless coverage.
What is a mesh Wi-Fi network?
Adds an extra layer of security by requiring more than just a password to log in.
What is Multi-Factor Authentication (MFA)?
This Microsoft 365 service allows administrators to manage and secure company devices, deploy apps, and enforce compliance policies across PCs and mobile devices.
What is Microsoft Intune?
Rather than deploying custom malware, attackers using this tactic abuse built‑in OS tools like PowerShell, or certutil to move laterally and maintain persistence.
What are living‑off‑the‑land attacks?
This publicly disclosed identifier is assigned to a known software vulnerability so security teams can track, patch, and discuss it consistently.
What is a CVE (Common Vulnerabilities and Exposures)?