1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is a DMZ?
A demilitarized zone (DMZ) is a buffer network between the internet and a private network that lets outside access happen safely without exposing internal systems.
What is the difference between an extranet and an intranet?
An intranet is only for internal employees.
An extranet allows outside users like vendors, to access limited company information.
Describe the purpose of a VLAN.
A VLAN groups devices logically so they act like they’re on the same network even if they’re physically in different places
What are some ways to secure a VLAN?
Place the router in a locked and restricted area
Ensure the VLAN is password protected
Configure the switch so each user has a unique login and password.
What is anti-virus software used for?
Anti virus software detects, blocks, and removes malicious software from a system.
How is role-based control used?
RBC gives users access based on their job role, so people only get the permissions they need
What is a security policy?
A security policy is a set of rules that explains how people must use and protect a network system
What is network access control?
NAC checks devices before allowing network access and can block or isolate devices that aren’t secure or compliant
What's the difference between a permanent and a dissolvable agent?
A permanent agent stays installed on a device all the time.
A dissolvable agent is temporary and only runs when the device connects
What is IAAA?
IAAA is a security framework that manages access to systems.
Identify the user
Authenticate their identity
Authorize what they’re allowed to do
Account for their actions to track usage
What is two-factor authentication?
2FA adds a second step to login, like a password plus a phone code to improve security
What is a password hash?
A password hash is a scrambled version of a password that can’t easily be reserved
What is deciphering?
Deciphering is converting coded or encrypted information back into readable form.
What is cryptography?
Cryptography is practice of securing information by turning it into code so only authorized people can read it.
What is WPA?
WPA is a security method used to protect Wi-Fi networks from unauthorized access