Lesson 16

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/10

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:32 AM on 7/17/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

11 Terms

1
New cards
The process of strengthening the security settings and defenses of network devices, servers, and workstations to protect against unauthorized access, data breaches, and other potential threats.
Harden Devices
2
New cards
The pre-configured passwords that come with network devices, which should be changed immediately to prevent unauthorized access.
Default Passwords
3
New cards
User accounts on network devices that are not actively used or needed, which should be removed to reduce the risk of unauthorized access.
Unnecessary Logins
4
New cards
A policy that requires users to create complex passwords with a combination of uppercase and lowercase letters, numbers, and special symbols, and to change their passwords regularly to enhance security.
Strong Password Policy
5
New cards
Optional features or services installed on network devices that are not actively used, which should be disabled or removed to minimize the risk of potential attacks.
Unnecessary Services
6
New cards
The process of regularly updating devices with the latest security patches and software updates to address known vulnerabilities and protect against potential exploits.
Patch Management
7
New cards
The ability to physically interact with a device, which can potentially lead to unauthorized access or manipulation. Limiting physical access is crucial for maintaining security.
Physical Access
8
New cards
A network that is deemed safe and authorized, typically the internal network of an organization, from which changes to network devices are allowed.
Trusted Network
9
New cards
The implementation of encryption protocols, such as WPA2 or WPA3, to secure wireless network traffic and prevent unauthorized interception of data.
Encryption for Wireless Networks
10
New cards
The process of monitoring and reviewing access logs and records to identify suspicious activity, detect breaches, and conduct forensic analysis of security incidents.
Audit Access
11
New cards
The creation and storage of copies of device configurations and data to ensure data recovery in the event of misconfiguration, attacks, or device failures.
Backup

Explore top notes

note
Full Approaches Notes
Updated 315d ago
0.0(0)
note
Chapter 3: Proteins
Updated 996d ago
0.0(0)
note
The Unfinished Melody
Updated 160d ago
0.0(0)
note
Rhetorical Techniques
Updated 145d ago
0.0(0)
note
Ch 14 - Money and Banking
Updated 1086d ago
0.0(0)
note
Full Approaches Notes
Updated 315d ago
0.0(0)
note
Chapter 3: Proteins
Updated 996d ago
0.0(0)
note
The Unfinished Melody
Updated 160d ago
0.0(0)
note
Rhetorical Techniques
Updated 145d ago
0.0(0)
note
Ch 14 - Money and Banking
Updated 1086d ago
0.0(0)

Explore top flashcards

flashcards
Spanish 1: 8a vocab
30
Updated 719d ago
0.0(0)
flashcards
Level C Unit 1 Definitions
20
Updated 228d ago
0.0(0)
flashcards
APUSH MIDTERM
38
Updated 841d ago
0.0(0)
flashcards
Uro- Penile Disorders
43
Updated 363d ago
0.0(0)
flashcards
Health - Ch 3 Test
36
Updated 775d ago
0.0(0)
flashcards
Management Test 1
75
Updated 782d ago
0.0(0)
flashcards
1A Appearance Vocab
44
Updated 1065d ago
0.0(0)
flashcards
Spanish 1: 8a vocab
30
Updated 719d ago
0.0(0)
flashcards
Level C Unit 1 Definitions
20
Updated 228d ago
0.0(0)
flashcards
APUSH MIDTERM
38
Updated 841d ago
0.0(0)
flashcards
Uro- Penile Disorders
43
Updated 363d ago
0.0(0)
flashcards
Health - Ch 3 Test
36
Updated 775d ago
0.0(0)
flashcards
Management Test 1
75
Updated 782d ago
0.0(0)
flashcards
1A Appearance Vocab
44
Updated 1065d ago
0.0(0)