Term
|
Definition
| Vulnerability scan that could potentially harm a system. |
|
|
Term
|
Definition
| Vulnerability scan that is non-invasive. |
|
|
Term
|
Definition
| Vulnerability scan gives you an idea of your topology. |
|
|
Term
| What can you do with a Discovery Scan? |
|
Definition
| You can discover what active IPs are on the network and an IP list to use as a pivot point. |
|
|
Term
|
Definition
| A vulnerability scan that is searching for something specific. |
|
|
Term
| How To Secure A Data Center Server |
|
Definition
Cable Locks
Antivirus
Host Based firewall
Proximity Reader
Sniffer
Mantrap |
|
|
Term
| How To Secure A Corporate Phone |
|
Definition
Sceen Lock
Strong Password
Device Encrypt
Remote Wipe
GPS Tracker
Pop up blocker |
|
|
Term
| Proximity badge should be used to secure what? |
|
Definition
|
|
Term
| Laptops are secured by Cable Locks, but employee laptops are secured by what? |
|
Definition
|
|
Term
| Key boxes should be secured in what? |
|
Definition
|
|
Term
|
Definition
| Forcing an agreement or log-in for internet access. |
|
|
Term
|
Definition
| Uses native IP for use of both networks. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| FTPS uses SSL over port 443, while SFTP is using what over what? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Separating different things to their own networks. |
|
|
Term
|
Definition
Parent/Child Trust
One way or Two way |
|
|
Term
|
Definition
| Closed Restricted Network |
|
|
Term
|
Definition
| Snatching router information |
|
|