2FA Ans✓✓✓-Another term for multi-factor authentication
802.1x Ans✓✓✓-Network access control protocol for trusted network access
AAA Interaction Ans✓✓✓-Client communication with a radius server via the
cloud
Access control Ans✓✓✓-Determining who can access data and what actions they
can perform
Access control Ans✓✓✓-Determining who has access to data and to what degree
Access control Ans✓✓✓-Restricting access to resources based on user
permissions
Accounting Ans✓✓✓-Process of verifying access control settings and providing a
forensic trail
Ad-hoc mode Ans✓✓✓-Wireless communication in a peer-to-peer fashion
without a WAP
Ad-hoc networks Ans✓✓✓-Used for setting up new devices or transferring files
between devices
,AES Ans✓✓✓-Advanced Encryption Standard with key lengths of 128-bit, 192-bit,
or 256-bit
AES-NI Ans✓✓✓-AES New Instructions, CPU instructions for AES encryption
Alphanumeric Ans✓✓✓-Containing both letters and numbers
Antivirus or Malware Scanners Ans✓✓✓-Software used to check for viruses or
malware on a computer
API Key Ans✓✓✓-A special string of characters used to authenticate service
accounts
ARP Ans✓✓✓-Address Resolution Protocol. Resolves IP addresses to MAC
addresses. ARP poisoning attacks can redirect traffic through an attacker's system
by sending false MAC address updates. VLAN segregation helps prevent the scope
of ARP poisoning attacks within a network.
Audit Logs Ans✓✓✓-Detailed records of actions taken within a cloud system for
accountability and security monitoring
Audit logs Ans✓✓✓-Records of device activity for analysis and detection
Authentication Ans✓✓✓-Process of confirming a person's identity
Authentication Ans✓✓✓-Process of verifying the identity of a user or device
, Authentication Ans✓✓✓-Proving your identity to access cloud resources
Authorization Ans✓✓✓-Controlling access to specific cloud resources
Authorization Ans✓✓✓-Determines what a user may access after authentication
Authorization Policies Ans✓✓✓-Policies defined by a network administrator for
determining user's access rights
Backend architecture Ans✓✓✓-The internal structure and design of a cloud
provider's system
Backup Ans✓✓✓-Creating copies of device configurations for restoration
Biometric Scan Ans✓✓✓-Facial, retinal, or fingerprint scan used for multi-factor
authentication
Bit length Ans✓✓✓-Number of bits in an encryption key
Brute force Ans✓✓✓-Method of trying all possible combinations to crack
encryption
Cloud deployment model Ans✓✓✓-The specific configuration and setup of a
cloud infrastructure