Complete Latest 2025/2026 with
Correct Answers and Rationales
GRADED A+
Terms in this set (107) Original
An application that identifies security issues on
Vulnerability Scanner a network and gives suggestions on how to
prevent the issues. A management control type.
An application that identifies ports and
Port Scanner
services that are at risk on a network.
An application that detects when network
IDS intrusions occur and identifies the appropriate
personnel..
, An application that protects a system against
Virus Scanner
viruses.
Presents public IP addresses to the internet on
NAT Server
behalf of computers on a private network.
Can be used to enable hosts to access Internet
resources. Can increase the performance of a
Proxy Server network by cachig Web pages, which can
reduce the amount of time required for clients
to access Web pages.
Ensures that wireless clients can only
Isolation Mode communicate with the wireless access point
and not with other wireless clients.
Protected Extensible Authentication Protocol.
A secure password-based authentication
PEAP
protocol created to simplify secure
authentication.
Lightweight Extensible Authentication
LEAP Protocol. An authentication protocol used
exclusively by Cisco.
, Disk striping. Stripes data across the drives to
RAID Level 0 improve disk read/write efficiency. Does not
provide redundancy.
Disk mirroring or disk duplexing. Any data
RAID Level 1 written to disk one is also written to disk two.
Provides redundancy.
Disk striping with parity and data across all
RAID Level 5 disks in the array. Requires at least three hard
disks.
Turn off remote maintenance features when not
needed. Use strong authentication on the
Protection against PBX attacks remote maintenance ports. Keep PBX
terminals in a locked, restricted area. Replace
or disable embedded logins and passwords.
Used to restrict data access and operating
system components, security applications,
Technical Controls network devices, protocols, and encryption
techniques. Include all authentication
mechanisms.
Detective Controls Used to detect intrusion when it occurs.