Protected EAP (PEAP) - is a protocol that utilizes a secure, encrypted TLS (Transport Layer Security) tunnel to encapsulate the EAP (Extensible Authentication Protocol) authentication., EAP - provides a method for two systems to create a secure encryption key, also known as a Pairwise Master Key, Bluesnarfing - unauthorized access to, or theft of information from, a Bluetooth device., Site-to-site VPNs - provide secure access between two networks, IPsec - a common tunneling protocol used with VPNs it secures traffic within a tunnel, 802.1X - provides strong port security using port based authentication. It prevents rogue devices from connecting to a network by ensuring only authorized clients can connect , Business Email Compromise - an attacker mimics a familiar contact's email address with minor alterations to deceive the recipient into executing unauthorized financial transactions., TACACS+ - a set of security protocols for remote access authentication and related services, VM Escape - an attacker breaks out of a VM and gains access to the host system, Stateful packet inspection (SPI) - monitor all aspects of the traffic streams, their characteristics and communication channels., syslog - protocol specifies a general log entry format and the details on how to transport log entries , Target of Evaluation (TOE) - the specific system, software, or product being assessed for its security properties. It is the focal point of the security evaluation process, SAML - is an XML-based standard used to exchange authentication and authorization information between different parties and provides SSO for web-based applications , VM Sprawl - This term describes the uncontrolled proliferation of VMs, not a security threat of this nature., Regulated data - data that is governed by external laws and regulations with which the organization must comply, data controller - the entity that determines the purposes, conditions, and means of processing personal data, data processor - an entity that processes personal data on behalf of the data controller, data custodian - typically an individual or entity responsible for managing the system where the data is stored, NIC teaming - allows you to group two or more physical network adapters into a single software-based virtual network adapter, MTBF - the average time between failures, MTTR - average time it takes to restore a failed system., Fail over tests - shut down the primary site to determine whether the fail over site works properly, Intellectual property - is information that is crucial to the way that an organization runs its business, Federation - the process of linking together different systems or organizations in a way that allows them to share resources, data, and authentication mechanisms securely., OpenID - an authentication protocol used primarily for web-based single sign-on. It enables users to log in once with a single ID and access a variety of applications across different domains, simplifying the user authentication process on the internet., CHAP - allows the client to pass credentials over a public network without allowing attackers to intercept the data and later use it in an attack., EOSL (End of Service Life) - the term used to describe the final stage in a product's lifecycle, particularly in the context of software and hardware., EOL (End of Life) - refers to when a product is no longer being manufactured or sold., Stateless packet filtering - filters network traffic based solely on predefined rules without maintaining any knowledge of previous connections or sessions., screen subnet - a part of a computer network where security measures are put in place to protect the network from cyber threats.,
0%
SEC+ 701
Share
Share
Share
by
Definitlynotyeager
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?