and CORRECT Answers
Network devices - CORRECT ANSWER- Switches, routers, and firewalls with access to data
Compromised device - CORRECT ANSWER- Device accessed by a malicious user or
attacker
Wireless networks - CORRECT ANSWER- Networks vulnerable to attackers in close
proximity
Hardening - CORRECT ANSWER- Process of securing and testing network devices
Default passwords - CORRECT ANSWER- Factory-set passwords that should be changed
Unnecessary logins - CORRECT ANSWER- Accounts not used by the network administrator
Strong password policy - CORRECT ANSWER- Requiring complex passwords and regular
changes
Unnecessary services - CORRECT ANSWER- Optional features that increase the risk of
attack
Patching - CORRECT ANSWER- Installing security updates to fix vulnerabilities
Physical access - CORRECT ANSWER- Ability to physically interact with a device
Trusted network - CORRECT ANSWER- Network authorized to make changes to a device
Wireless network encryption - CORRECT ANSWER- Configuring WPA2 or WPA3 for
secure traffic
, Audit logs - CORRECT ANSWER- Records of device activity for analysis and detection
Backup - CORRECT ANSWER- Creating copies of device configurations for restoration
Authentication - CORRECT ANSWER- Process of confirming a person's identity
Microsoft Active Directory - CORRECT ANSWER- Authentication system that confirms
user identity via passwords
Public Key Infrastructure (PKI) - CORRECT ANSWER- Authentication system that uses
certificates to validate website identity
Authorization - CORRECT ANSWER- Determines what a user may access after
authentication
Restrictive Permissions - CORRECT ANSWER- Applying limited access to data and
securing servers and network devices
Data Leaks - CORRECT ANSWER- Risk of unauthorized access to confidential data
Malware Infection - CORRECT ANSWER- Accidental infection of network data files by a
user's infected computer
AAA Interaction - CORRECT ANSWER- Client communication with a radius server via the
cloud
Accounting - CORRECT ANSWER- Process of verifying access control settings and
providing a forensic trail
Immutable Logs - CORRECT ANSWER- Audit logs stored in an unchangeable form to
prevent tampering