CORRECT ANSWERS
Limited Network Access - CORRECT ANSWERS-Restricted access to certain
network resources
Network Access Request - CORRECT ANSWERS-Request made by a client to
connect to a network
Network devices - CORRECT ANSWERS-Switches, routers, and firewalls with
access to data
Compromised device - CORRECT ANSWERS-Device accessed by a malicious
user or attacker
Wireless networks - CORRECT ANSWERS-Networks vulnerable to attackers in
close proximity
Wireless network attacks - CORRECT ANSWERS-Attacks on wireless networks
that can be done remotely
Denial of Service (DoS) attack - CORRECT ANSWERS-An attack that enables
unauthorized access and traffic monitoring of a wireless network
Deauth attack - CORRECT ANSWERS-A denial-of-service (DoS) attack where
the attacker can force clients off a network
WPA3 security - CORRECT ANSWERS-A security protocol that encrypts
management packets in a wireless network
WPA2 security - CORRECT ANSWERS-A security protocol that encrypts data
traffic in a wireless network
Fake Access attack - CORRECT ANSWERS-An attack where an attacker sets
up an illegitimate wireless network to intercept data
VPN tunnel - CORRECT ANSWERS-A secure connection that encrypts all traffic
sent and received over a wireless network
802.1x - CORRECT ANSWERS-Network access control protocol for trusted
network access
, WAP - CORRECT ANSWERS-Wireless Access Point used for network access
RADIUS - CORRECT ANSWERS-Remote Authentication Dial-In User Service for
validating credentials
EAP - CORRECT ANSWERS-Extensible Authentication Protocol used for
validating credentials
Authorization Policies - CORRECT ANSWERS-Policies defined by a network
administrator for determining user's access rights
Antivirus or Malware Scanners - CORRECT ANSWERS-Software used to check
for viruses or malware on a computer
Corporate Standard - CORRECT ANSWERS-Set of requirements or guidelines
for devices used in a corporate network
Hardening - CORRECT ANSWERS-Process of securing and testing network
devices
Default passwords - CORRECT ANSWERS-Factory-set passwords that should
be changed
Unnecessary logins - CORRECT ANSWERS-Accounts not used by the network
administrator
Strong password policy - CORRECT ANSWERS-Requiring complex passwords
and regular changes
Unnecessary services - CORRECT ANSWERS-Optional features that increase
the risk of attack
Patching - CORRECT ANSWERS-Installing security updates to fix
vulnerabilities
Physical access - CORRECT ANSWERS-Ability to physically interact with a
device
Trusted network - CORRECT ANSWERS-Network authorized to make changes
to a device
Wireless network encryption - CORRECT ANSWERS-Configuring WPA2 or
WPA3 for secure traffic