Protected EAP (PEAP) - is a protocol that utilizes a secure, encrypted TLS (Transport Layer Security) tunnel to encapsulate the EAP (Extensible Authentication Protocol) authentication., EAP - provides a method for two systems to create a secure encryption key, also known as a Pairwise Master Key, Bluesnarfing - unauthorized access to, or theft of information from, a Bluetooth device., Site-to-site VPNs - provide secure access between two networks, IPsec - a common tunneling protocol used with VPNs it secures traffic within a tunnel, 802.1X - provides strong port security using port based authentication. It prevents rogue devices from connecting to a network by ensuring only authorized clients can connect , Business Email Compromise - an attacker mimics a familiar contact's email address with minor alterations to deceive the recipient into executing unauthorized financial transactions., TACACS+ - a set of security protocols for remote access authentication and related services, VM Escape - an attacker breaks out of a VM and gains access to the host system, Stateful packet inspection (SPI) - monitor all aspects of the traffic streams, their characteristics and communication channels., syslog - protocol specifies a general log entry format and the details on how to transport log entries , Target of Evaluation (TOE) - the specific system, software, or product being assessed for its security properties. It is the focal point of the security evaluation process, SAML - is an XML-based standard used to exchange authentication and authorization information between different parties and provides SSO for web-based applications , VM Sprawl - This term describes the uncontrolled proliferation of VMs, not a security threat of this nature., Regulated data - data that is governed by external laws and regulations with which the organization must comply, data controller - the entity that determines the purposes, conditions, and means of processing personal data, data processor - an entity that processes personal data on behalf of the data controller, data custodian - typically an individual or entity responsible for managing the system where the data is stored, NIC teaming - allows you to group two or more physical network adapters into a single software-based virtual network adapter, MTBF - the average time between failures, MTTR - average time it takes to restore a failed system., Fail over tests - shut down the primary site to determine whether the fail over site works properly, Intellectual property - is information that is crucial to the way that an organization runs its business, Federation - the process of linking together different systems or organizations in a way that allows them to share resources, data, and authentication mechanisms securely., OpenID - an authentication protocol used primarily for web-based single sign-on. It enables users to log in once with a single ID and access a variety of applications across different domains, simplifying the user authentication process on the internet., CHAP - allows the client to pass credentials over a public network without allowing attackers to intercept the data and later use it in an attack., EOSL (End of Service Life) - the term used to describe the final stage in a product's lifecycle, particularly in the context of software and hardware., EOL (End of Life) - refers to when a product is no longer being manufactured or sold., Stateless packet filtering - filters network traffic based solely on predefined rules without maintaining any knowledge of previous connections or sessions., screen subnet - a part of a computer network where security measures are put in place to protect the network from cyber threats.,
0%
SEC+ 701
共享
共享
共享
由
Definitlynotyeager
编辑内容
打印
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
匹配游戏
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?