VLAN
What is a method of segmenting a network at the Data Link Layer (2) of the OSI model, typically on a switch.
WPA2 - Enterprise
What is a type of wireless network encryption that uses a RADIUS server to authenticate a user with a directory service such as AD after the device authenticates with the wifi access point.
WIPS
What is Wireless Intrusion Prevention System, an inline wireless network security device that monitors suspicious wifi traffic and reacts in real time to block suspicious traffic.
3389
What port does Remote Desktop Protocol use to connect remote computing sessions?
ACL
What is an Access Control List?
Implemented on a router to filter network traffic based on a set of rules.
In DAC, it is the access permissions assigned to a resource by the owner.
VDE
What is a Virtual Desktop Environment, a virtual machine that runs a desktop operating system such as Windows 10.
25
What is the port used by email servers to transfer messages, Simple Mail Transfer Protocol is the associated protocol.
EMI
What is Electromagnetic Interference? A byproduct of electrical systems that causes interference with other nearby systems. Can cause unexpected wifi network problems.
802.11ac
What is the Wi-Fi protocol that only works in the 5Ghz frequency range and can combine channels to increase throughput. Supports speeds up to 1300 Mbps.
APT
What is Advanced Persistent Threat? An attack method that maintains access to a compromised resource for a long period of time. Bot is a good example.
XSS
What is Cross Site Scripting, a web application attack that takes advantage of scripting and input validation vulnerabilities in a web site.
53
What is the port used by DNS?
BCP
What is a Business Continuity Plan? The plan a business has to maintain business operations after an incident.
POP/S
What is Post Office Protocol, an email protocol used to deliver email to users. Uses port 110 for unsecured and 995 for secure POP.
COPE
What is Corporate Owned, Personally Enabled? A mobile device management model where the organization issues a corporate device to an employee and allows the employee some freedom of configuration on the device while maintaining device supervision and management.
What is Secure/Multipurpose Mail Extensions, an email encryption standard that adds digital certificates and PKI to traditional email communications.
AUP
What is an Acceptable Use Policy? A policy used by an organization to define the rules of user behavior while using organizational computing resources. Normally signed by the user before they can access organizational computing systems.
CIA (triad, not cooking school)
What is Confidentiality, Integrity, and Availability? Basic principles of security control for access, change or integrity of data, and whether data is available for use.
EAP
20/21
What ports does File Transfer Protocol use?
HTTPS
What is Hyper-Text Transfer Protocol Secure? Uses port 443 to secure a connection between a web browser and the web server.
AH
What is Authentication Header? An IPSec protocol that authenticates the origin of transmitted data and protects against replay attacks.
ABAC
BIA
What is Business Impact Analysis? A process that identifies risks to an organization and determines the possible effects of those risks on business processes.
AES
What is Advanced Encryption Standard? A symmetric block cypher algorithm.