What is CIA Triad?
What is Confidentality?
What is Symmetrical Encryption?
What is Asymmetrical Encryption?
What is Integrity?
What is Availability?
What is Confidentiality Attack?
Attempt to make data viewable by attacker
What is Integrity Attack?
Attempt to alter data
What is Availability Attack?
Attempt to limit network accessibility and usability
What is TACACS+?
What is RADIUS?
What is NAC?
What is CVE?
What is Zero Day?
What is DLP?
What is DMZ?
What is Honeypot/Honeynet?
Attracts and traps potential attackers to counteract any attempts at unauthorized access to a network
What is Kerberos?
In the Kerberos-based authentication process, the purpose of the client’s timestamp is to provide countermeasure against?
Replay Attacks
What protocol ensures the reliability of the Kerberos authentication process?
NTP
What is SIEM?
What is Penetration Testing?
What is Vulnerability Scanning?
What is ACL?