100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D315: NETWORK SECURITY CONCEPTS 2025–2026: MOST COMMON TERMS AND DEFINITIONS (HARVARD STYLE) (HARVARD STYLE)

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
26-06-2025
Written in
2024/2025

WGU D315: NETWORK SECURITY CONCEPTS 2025–2026: MOST COMMON TERMS AND DEFINITIONS (HARVARD STYLE) (HARVARD STYLE) WGU D315: NETWORK SECURITY CONCEPTS 2025–2026: MOST COMMON TERMS AND DEFINITIONS (HARVARD STYLE) (HARVARD STYLE)

Institution
WGU D315: NETWORK SECURITY CONCEPTS 2025–2026: MOS
Course
WGU D315: NETWORK SECURITY CONCEPTS 2025–2026: MOS










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D315: NETWORK SECURITY CONCEPTS 2025–2026: MOS
Course
WGU D315: NETWORK SECURITY CONCEPTS 2025–2026: MOS

Document information

Uploaded on
June 26, 2025
Number of pages
16
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D315: NETWORK SECURITY CONCEPTS 2025–2026:
MOST COMMON TERMS AND DEFINITIONS (HARVARD
STYLE) (HARVARD STYLE)
INCLUDES CRITICAL TERMS FOR NETWORK SECURITY EXAMS AND TRAINING, SUCH AS SWITCHES,
ROUTERS, FIREWALLS, COMPROMISED DEVICES, WIRELESS VULNERABILITIES, HARDENING
PRACTICES, DEFAULT PASSWORDS, AND UNUSED LOGINS. UPDATED FOR 2025–2026 WITH
HARVARD STYLE REFERENCING FOR ACCURATE STUDY SUPPORT.




Network devices - CORRECT ANSWER -Switches, routers, and firewalls with access to data



Compromised device - CORRECT ANSWER-Device accessed by a malicious user or attacker



Wireless networks - CORRECT ANSWER -Networks vulnerable to attackers in close proximity



Hardening - CORRECT ANSWER -Process of securing and testing network devices



Default passwords - CORRECT ANSWER -Factory-set passwords that should be changed



Unnecessary logins - CORRECT ANSWER -Accounts not used by the network administrator



Strong password policy - CORRECT ANSWER -Requiring complex passwords and regular changes



Unnecessary services - CORRECT ANSWER -Optional features that increase the risk of attack



Patching - CORRECT ANSWER -Installing security updates to fix vulnerabilities



Physical access - CORRECT ANSWER -Ability to physically interact with a device



Trusted network - CORRECT ANSWER -Network authorized to make changes to a device

,Wireless network encryption - CORRECT ANSWER -Configuring WPA2 or WPA3 for secure traffic



Audit logs - CORRECT ANSWER -Records of device activity for analysis and detection



Backup - CORRECT ANSWER -Creating copies of device configurations for restoration



Authentication - CORRECT ANSWER -Process of confirming a person's identity



Microsoft Active Directory - CORRECT ANSWER -Authentication system that confirms user
identity via passwords



Public Key Infrastructure (PKI) - CORRECT ANSWER -Authentication system that uses certificates
to validate website identity



Authorization - CORRECT ANSWER -Determines what a user may access after authentication



Restrictive Permissions - CORRECT ANSWER -Applying limited access to data and securing
servers and network devices



Data Leaks - CORRECT ANSWER-Risk of unauthorized access to confidential data



Malware Infection - CORRECT ANSWER -Accidental infection of network data files by a user's
infected computer



AAA Interaction - CORRECT ANSWER -Client communication with a radius server via the cloud



Accounting - CORRECT ANSWER -Process of verifying access control settings and providing a
forensic trail

, Immutable Logs - CORRECT ANSWER -Audit logs stored in an unchangeable form to prevent
tampering



MFA - CORRECT ANSWER -Multi-factor authentication, an optional add-on to the authentication
process



2FA - CORRECT ANSWER -Another term for multi-factor authentication



PIN - CORRECT ANSWER -Personal Identification Number used as part of multi-factor
authentication



Biometric Scan - CORRECT ANSWER -Facial, retinal, or fingerprint scan used for multi-factor
authentication



Touch ID - CORRECT ANSWER -Fingerprint scan used for authentication on Apple devices



Face ID - CORRECT ANSWER -Facial recognition scan used for authentication on Apple devices



Proximity-based Security - CORRECT ANSWER -Automatic unlocking of devices when in close
range



Windows Hello - CORRECT ANSWER -Mechanism on Microsoft Windows computers using
fingerprint or facial recognition



Wireless network attacks - CORRECT ANSWER -Attacks on wireless networks that can be done
remotely



Denial of Service (DoS) attack - CORRECT ANSWER -An attack that enables unauthorized access
and traffic monitoring of a wireless network



Deauth attack - CORRECT ANSWER -A denial-of-service (DoS) attack where the attacker can
force clients off a network

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
JAMES125 Chamberlain College Of Nursng
View profile
Follow You need to be logged in order to follow users or courses
Sold
340
Member since
2 year
Number of followers
42
Documents
3230
Last sold
3 days ago
MY MAIN GOAL IS TO MAKE YOU PASS GOOD LUCK

MY MAIN GOAL IS TO MAKE YOU PASS GOOD LUCK. As a dedicated nursing student with a passion for helping peers succeed, I specialize in providing high-quality study resources on STUVIA including ATI modules and other essential certifications, earning excellent ratings and a stellar reputation for boosting students' grades. My commitment to excellence

5.0

3104 reviews

5
3016
4
47
3
27
2
6
1
8

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions