Term
|
Definition
Vulnerability scan that could potentially harm a system. |
|
|
Term
|
Definition
Vulnerability scan that is non-invasive. |
|
|
Term
|
Definition
Vulnerability scan gives you an idea of your topology. |
|
|
Term
What can you do with a Discovery Scan? |
|
Definition
You can discover what active IPs are on the network and an IP list to use as a pivot point. |
|
|
Term
|
Definition
A vulnerability scan that is searching for something specific. |
|
|
Term
How To Secure A Data Center Server |
|
Definition
Cable Locks
Antivirus
Host Based firewall
Proximity Reader
Sniffer
Mantrap |
|
|
Term
How To Secure A Corporate Phone |
|
Definition
Sceen Lock
Strong Password
Device Encrypt
Remote Wipe
GPS Tracker
Pop up blocker |
|
|
Term
Proximity badge should be used to secure what? |
|
Definition
|
|
Term
Laptops are secured by Cable Locks, but employee laptops are secured by what? |
|
Definition
|
|
Term
Key boxes should be secured in what? |
|
Definition
|
|
Term
|
Definition
Forcing an agreement or log-in for internet access. |
|
|
Term
|
Definition
Uses native IP for use of both networks. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
FTPS uses SSL over port 443, while SFTP is using what over what? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Separating different things to their own networks. |
|
|
Term
|
Definition
Parent/Child Trust
One way or Two way |
|
|
Term
|
Definition
Closed Restricted Network |
|
|
Term
|
Definition
Snatching router information |
|
|