ANSWERS
QUESTIONS AND ANSWERS
Network devices. ANSWER -Switches, routers, and firewalls with access to data
Compromised device. ANSWER -Device accessed by a malicious user or attacker
Wireless networks. ANSWER -Networks vulnerable to attackers in close proximity
Hardening. ANSWER -Process of securing and testing network devices
Default passwords. ANSWER -Factory-set passwords that should be changed
Unnecessary logins. ANSWER -Accounts not used by the network administrator
Strong password policy. ANSWER -Requiring complex passwords and regular changes
Unnecessary services. ANSWER -Optional features that increase the risk of attack
Patching. ANSWER -Installing security updates to fix vulnerabilities
, Physical access. ANSWER -Ability to physically interact with a device
Trusted network. ANSWER -Network authorized to make changes to a device
Wireless network encryption. ANSWER -Configuring WPA2 or WPA3 for secure traffic
Audit logs. ANSWER -Records of device activity for analysis and detection
Backup. ANSWER -Creating copies of device configurations for restoration
Authentication. ANSWER -Process of confirming a person's identity
Microsoft Active Directory. ANSWER -Authentication system that confirms user identity
via passwords
Public Key Infrastructure (PKI). ANSWER -Authentication system that uses certificates to
validate website identity
Authorization. ANSWER -Determines what a user may access after authentication
Restrictive Permissions. ANSWER -Applying limited access to data and securing servers
and network devices
Data Leaks. ANSWER -Risk of unauthorized access to confidential data
Malware Infection. ANSWER -Accidental infection of network data files by a user's infected
computer
AAA Interaction. ANSWER -Client communication with a radius server via the cloud
Accounting. ANSWER -Process of verifying access control settings and providing a
forensic trail