Domain 4.1

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:24 PM on 4/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

35 Terms

1
New cards

Secure baselines

Standard secure system configurations

2
New cards

Establish

Create approved secure settings

3
New cards

Deploy

Apply secure configurations to systems

4
New cards

Maintain

Keep configurations updated and enforced

5
New cards

Hardening targets

Systems requiring security strengthening

6
New cards

Mobile devices

Portable computing devices

7
New cards

Workstations

User desktop or laptop systems

8
New cards

Switches

Network devices connecting devices in a LAN

9
New cards

Routers

Devices routing traffic between networks

10
New cards

Servers

Systems providing services or resources

11
New cards

ICS

Industrial systems controlling operations

12
New cards

IoT devices

Internet-connected smart devices

13
New cards

Wireless devices

Devices using wireless communication

14
New cards

Installation considerations

Factors reviewed before deployment

15
New cards

Site surveys

Assessment of wireless coverage area

16
New cards

Heat maps

Visual map of signal strength

17
New cards

Mobile solutions

Security for portable device environments

18
New cards

Mobile Device Management (MDM)

System managing and securing mobile devices

19
New cards

Deployment models

Device ownership strategies

20
New cards

Bring Your Own Device (BYOD)

Employees use personal devices for work

21
New cards

Corporate-Owned, Personally-Enabled (Cope)

Owned, Personally Enabled

22
New cards

Choose Your Own Device (CYOD)

Employee selects from approved devices

23
New cards

Connection methods

Ways devices connect to networks

24
New cards

Cellular

Mobile network data connection

25
New cards

Wireless security settings

Wireless protection configurations

26
New cards

WPA3

Latest Wi-Fi security protocol

27
New cards

RADIUS

protocol that provides centralized AAA

28
New cards

Cryptographic protocols

Rules for encrypted communication

29
New cards

Authentication protocols

Methods verifying identity

30
New cards

Application security

Protecting software from threats

31
New cards

Input validation

Checking user input for safety

32
New cards

Secure cookies

Protected browser cookies

33
New cards

Static code analysis

Reviewing source code for flaws

34
New cards

Code signing

Digitally verifying software integrity

35
New cards

Sandboxing

Running code in an isolated environment