WGU - D315 Network and Security Foundations

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/172

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

173 Terms

1
New cards

Network devices

Switches, routers, and firewalls with access to data

2
New cards

Compromised device

Device accessed by a malicious user or attacker

3
New cards

Wireless networks

Networks vulnerable to attackers in close proximity

4
New cards

Hardening

Process of securing and testing network devices

5
New cards

Default passwords

Factory-set passwords that should be changed

6
New cards

Unnecessary logins

Accounts not used by the network administrator

7
New cards

Strong password policy

Requiring complex passwords and regular changes

8
New cards

Unnecessary services

Optional features that increase the risk of attack

9
New cards

Patching

Installing security updates to fix vulnerabilities

10
New cards

Physical access

Ability to physically interact with a device

11
New cards

Trusted network

Network authorized to make changes to a device

12
New cards

Wireless network encryption

Configuring WPA2 or WPA3 for secure traffic

13
New cards

Audit logs

Records of device activity for analysis and detection

14
New cards

Backup

Creating copies of device configurations for restoration

15
New cards

Authentication

Process of confirming a person's identity

16
New cards

Microsoft Active Directory

Authentication system that confirms user identity via passwords

17
New cards

Public Key Infrastructure (PKI)

Authentication system that uses certificates to validate website identity

18
New cards

Authorization

Determines what a user may access after authentication

19
New cards

Restrictive Permissions

Applying limited access to data and securing servers and network devices

20
New cards

Data Leaks

Risk of unauthorized access to confidential data

21
New cards

Malware Infection

Accidental infection of network data files by a user's infected computer

22
New cards

AAA Interaction

Client communication with a radius server via the cloud

23
New cards

Accounting

Process of verifying access control settings and providing a forensic trail

24
New cards

Immutable Logs

Audit logs stored in an unchangeable form to prevent tampering

25
New cards

MFA

Multi-factor authentication, an optional add-on to the authentication process

26
New cards

2FA

Another term for multi-factor authentication

27
New cards

PIN

Personal Identification Number used as part of multi-factor authentication

28
New cards

Biometric Scan

Facial, retinal, or fingerprint scan used for multi-factor authentication

29
New cards

Touch ID

Fingerprint scan used for authentication on Apple devices

30
New cards

Face ID

Facial recognition scan used for authentication on Apple devices

31
New cards

Proximity-based Security

Automatic unlocking of devices when in close range

32
New cards

Windows Hello

Mechanism on Microsoft Windows computers using fingerprint or facial recognition

33
New cards

Wireless network attacks

Attacks on wireless networks that can be done remotely

34
New cards

Denial of Service (DoS) attack

An attack that enables unauthorized access and traffic monitoring of a wireless network

35
New cards

Deauth attack

A denial-of-service (DoS) attack where the attacker can force clients off a network

36
New cards

WPA3 security

A security protocol that encrypts management packets in a wireless network

37
New cards

WPA2 security

A security protocol that encrypts data traffic in a wireless network

38
New cards

Fake Access attack

An attack where an attacker sets up an illegitimate wireless network to intercept data

39
New cards

VPN tunnel

A secure connection that encrypts all traffic sent and received over a wireless network

40
New cards

802.1x

Network access control protocol for trusted network access

41
New cards

WAP

Wireless Access Point used for network access

42
New cards

RADIUS

Remote Authentication Dial-In User Service for validating credentials

43
New cards

EAP

Extensible Authentication Protocol used for validating credentials

44
New cards

Authorization Policies

Policies defined by a network administrator for determining user's access rights

45
New cards

Antivirus or Malware Scanners

Software used to check for viruses or malware on a computer

46
New cards

Corporate Standard

Set of requirements or guidelines for devices used in a corporate network

47
New cards

Limited Network Access

Restricted access to certain network resources

48
New cards

Network Access Request

Request made by a client to connect to a network

49
New cards

Network Access Grant

Permission given by the WAP or switch to allow network access

50
New cards

Ad-hoc mode

Wireless communication in a peer-to-peer fashion without a WAP

51
New cards

Ad-hoc networks

Used for setting up new devices or transferring files between devices

52
New cards

Infrastructure mode

Wireless devices connected to the network via wireless routers or access points

53
New cards

Wireless router

Combination of a WAP and a router, used to connect to the internet and provide wireless connectivity

54
New cards

Triple DES

Symmetric encryption algorithm using DES three times in a row

55
New cards

AES

Advanced Encryption Standard with key lengths of 128-bit, 192-bit, or 256-bit

56
New cards

WEP

Wired Equivalent Privacy, an outdated wireless security standard

57
New cards

WPA

Wi-Fi Protected Access, a wireless security standard to overcome WEP weaknesses

58
New cards

WPA2

Wi-Fi Protected Access 2, the standard for wireless security for 15 years

59
New cards

WPA3

Wi-Fi Protected Access 3, released in 2018 to address WPA2 weaknesses

60
New cards

DES

Data Encryption Standard, an antiquated encryption algorithm

61
New cards

NIST

National Institute of Standards and Technology, a US government agency

62
New cards

Microsoft

A multinational technology company

63
New cards

Wi-Fi

Wireless networking technology

64
New cards

Brute force

Method of trying all possible combinations to crack encryption

65
New cards

Encryption

Process of converting data into a secure form

66
New cards

Symmetric key algorithm

Encryption algorithm that uses the same key for both encryption and decryption

67
New cards

Key length

Number of bits in an encryption key

68
New cards

Quantum computing

Computing using quantum bits (qubits) instead of classical bits

69
New cards

Hardware acceleration

Using specialized hardware to speed up a specific task

70
New cards

CPU instruction set

Set of commands that a CPU can understand and execute

71
New cards

AES-NI

AES New Instructions, CPU instructions for AES encryption

72
New cards

WEP key

Encryption key used in Wired Equivalent Privacy

73
New cards

Hexadecimal

Number system with base 16, using digits 0-9 and letters A-F

74
New cards

Bit length

Number of bits in an encryption key

75
New cards

Wi-Fi Alliance

Organization that certifies interoperability of Wi-Fi devices

76
New cards

Wi-Fi protected access

Wireless security standard to overcome WEP weaknesses

77
New cards

IEEE

Institute of Electrical and Electronics Engineers, a professional association

78
New cards

Alphanumeric

Containing both letters and numbers

79
New cards

Passphrase

Sequence of characters used to authenticate or encrypt

80
New cards

Temporal key integrity protocol

Encryption process that generates a new key for every packet

81
New cards

TKIP

Temporal Key Integrity Protocol, encryption process used in WPA

82
New cards

WPA2

Wi-Fi Protected Access 2, the standard for wireless security for 15 years

83
New cards

Counter Mode Cipher Block Chaining Message Authentication Code Protocol

CCMP, part of the AES encryption standard used in WPA2

84
New cards

Data confidentiality

Protection of data from unauthorized access

85
New cards

Authentication

Process of verifying the identity of a user or device

86
New cards

Access control

Restricting access to resources based on user permissions

87
New cards

WPA3

Wi-Fi Protected Access 3, released in 2018 to address WPA2 weaknesses

88
New cards

Enterprise mode

Mode of operation for Wi-Fi networks in organizations

89
New cards

Personal mode

Mode of operation for Wi-Fi networks for personal use

90
New cards

Simultaneous authentication of equals

SAE, method used in WPA3 to exchange network keys

91
New cards

IEEE 802.11-2016

Standard for wireless network communication

92
New cards

Forward secrecy

PFS, method that ensures compromised keys only affect one session

93
New cards

Perfect forward secrecy

PFS, method that ensures compromised keys only affect one session

94
New cards

Encryption session

Period of time during which data is encrypted

95
New cards

Management frames

Network control messages exchanged between devices

96
New cards

Deauth Attack

Exploit that de-associates a device from a Wi-Fi network

97
New cards

Interoperability

Ability of different systems to work together

98
New cards

Wireless devices

Devices that connect to a wireless network

99
New cards

Routers

Devices that connect multiple networks together

100
New cards

Authentication

Proving your identity to access cloud resources