Domain 4.5

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:15 PM on 4/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

33 Terms

1
New cards

Firewall

Device that filters network traffic

2
New cards

Rules

Conditions that allow or block traffic

3
New cards

Access lists

List of allowed or denied traffic

4
New cards

Ports/protocols

Communication channels and rules

5
New cards

Screened subnets

Isolated network segment for security

6
New cards

IDS

System that detects attacks and sends alerts.

7
New cards

Trends

Patterns of suspicious activity

8
New cards

Signatures

Known attack patterns

9
New cards

Web filter

System that blocks unsafe websites

10
New cards

Centralized proxy

server that filters internet traffic

11
New cards

URL scanning

Checking websites for threats

12
New cards

Content categorization

Grouping websites by type

13
New cards

Block rules

Rules that block certain sites

14
New cards

Reputation

Trust score for websites

15
New cards

Operating system security

Protection for the operating system

16
New cards

Group Policy

Central control of system settings

17
New cards

SELinux

Linux system that restricts access

18
New cards

Secure protocols

Protocols that protect data in transit

19
New cards

Protocol selection

Choosing a secure protocol

20
New cards

Port selection

Choosing a communication port

21
New cards

Transport method

How data moves across networks

22
New cards

DNS filtering

Blocking harmful websites through DNS

23
New cards

Email security

Protection against email threats

24
New cards

DMARC

Email rule that prevents spoofing

25
New cards

DKIM

Signature verifying email authenticity

26
New cards

SPF

Checks if sender is allowed to send email

27
New cards

Gateway

System that filters incoming email

28
New cards

File integrity monitoring

Detects changes to important files

29
New cards

NAC

checks devices before allowing them onto a network.

30
New cards

EDR

Detects and responds to endpoint threats

31
New cards

XDR

Detects & responds to threats across multiple systems

32
New cards

User behavior analytics

Detects unusual user activity

33
New cards

IPS

System that detects and blocks attacks.