Security Measures
Wireless Security Protocols and Authentication Methods
Malware detection, prevention, and tools
Social Engineering Attacks, Threats, and Vulernabilities
SOHO (Small Office/Home Office) Configuration
100

A Method of being able to visually see who is coming and going without being in the room.

What is Video Surveillance?

100

Uses Advanced Encryption Standard.

What is WPA2?

100

The best way to prevent device infection.

What is User-Education?

100

This is a fraudulent email pretending to be from a legitimate source in order to get information from a user.

What is phishing?

100

Change default credentials.

What is the first thing to do when setting up a SOHO?

200

An Authentication method that authenticates based on two or more different kind of authentication

What is MFA?

200

An encryption method used for wireless networks.

What is Advanced Encryption Standard (AES)?

200

This malware locks down data and files in order to exploit a company/user into paying the hacker money to unlock the data and files.

What is Ransomware?

200

This is a fraudulent call to get information from a user.

What is Vishing?

200

SSID (Service Set Identifier).

What is the network identifier that broadcasts out to devices.

300

Concepts like security policies and software safeguards that are used to protect systems

What is logical security?

300

This centralized authentication and accounting.

What is Remote Authentication Dial-In User Service (RADIUS)?

300
This tracks all keystrokes made on the computer to steal private data, credentials, and or credit card numbers.

What is a Keylogger?

300

This is when two identical SSID's are visible to a user to steal information over wifi.

What is an Evil Twin?

300

Placing ____ in the center of the office space on or close to the ceiling disperses the radio waves to cover the whole office evenly.

What is a router/WAP?

400

This is used to specify which traffic should be allowed through a firewall and which should be blocked.

What is an ACL (Access Control List)?

400

An open standard for authentication that is used in conjunction with AD for Authentication.

What is Kerberos?

400

This virus infects the master boot record of a drive and is designed to load when a device is booted up, thus reinfecting the OS each time.

What is a Boot Sector Virus?

400

This is when an exploit has not been discovered or has been discovered but not yet patched out.

What is a Zero-Day Attack?

400

A protocol that is designed to make connecting to a wifi router easier by automatically connecting devices without the need for configuration.

What is Universal Plug and Play (UPnP)?

500

A software that is used to enforce security measues on mobile devices, such as cell phones, tablets, and laptops.

What is MDM (Mobile Device Management)?

500

introduced 192-bit cryptographic strength in Enterprise mode and requires CCMP 128 as a minimum in personal mode

What is WPA3?

500

This is designed to trick a user into believing their computer is infected with a virus.

What is scareware?

500

This is used to embed malicious scripts into a legitimate web page.

What is XSS (Cross-Site Scripting)?

500

Disabling this will prevent data packets from automatically being received by a device, sometimes without you knowing.

What is port fowarding?