DATABASE SYSTEMS COMPREHENSIVE
STUDY GUIDE
◉Compromised device. Answer: Device accessed by a malicious user
or attacker
◉Wireless networks. Answer: Networks vulnerable to attackers in
close proximity
◉Hardening. Answer: Process of securing and testing network
devices
◉Default passwords. Answer: Factory-set passwords that should be
changed
◉Unnecessary logins. Answer: Accounts not used by the network
administrator
◉Strong password policy. Answer: Requiring complex passwords
and regular changes
,◉Unnecessary services. Answer: Optional features that increase the
risk of attack
◉Patching. Answer: Installing security updates to fix vulnerabilities
◉Physical access. Answer: Ability to physically interact with a device
◉Trusted network. Answer: Network authorized to make changes to
a device
◉Wireless network encryption. Answer: Configuring WPA2 or
WPA3 for secure traffic
◉Audit logs. Answer: Records of device activity for analysis and
detection
◉Backup. Answer: Creating copies of device configurations for
restoration
◉Authentication. Answer: Process of confirming a person's identity
◉Microsoft Active Directory. Answer: Authentication system that
confirms user identity via passwords
, ◉Public Key Infrastructure (PKI). Answer: Authentication system
that uses certificates to validate website identity
◉Authorization. Answer: Determines what a user may access after
authentication
◉Restrictive Permissions. Answer: Applying limited access to data
and securing servers and network devices
◉Data Leaks. Answer: Risk of unauthorized access to confidential
data
◉Malware Infection. Answer: Accidental infection of network data
files by a user's infected computer
◉AAA Interaction. Answer: Client communication with a radius
server via the cloud
◉Accounting. Answer: Process of verifying access control settings
and providing a forensic trail
◉Immutable Logs. Answer: Audit logs stored in an unchangeable
form to prevent tampering