Thursday, March 12, 2020

Network+ Chapter 19 Power Words - Blank

Chapter 19 - Protecting Your Network
Defined
1. Mantrap 
2. Monlist
3. NAC
4. Network-Based anti-malware
5. Network-based firewall
6. Network Closet
7. Non-persistent agent
8. Ntpdc
9. OUI
10. Outbound traffic
11. PDos
12. Persistent agent
13. Phishing
14. Posture Assessment
15. Proximity Reader
16. Quarantine Network
17. Reddit Effect
18. Reflection
19. Cipher lock
20. Cleartext credential
21. Closed circuit television
22. Cloud 
23. DZ
24. DOS
25. DHCP snooping 
26. DDOS 
27. DAC 
28. DAI 
29. Edge
30. Effective permission
31. External firewall 
32. Fail close
33. Fail open 
34. Fault tolerance
35. Firewall
36. Guest network
37. Hardening 
38. Hardware Appliance 
39. Honeynet 
40. Honeypot
41. Host-Based Anti-Malware
42. Host-Based Firewall 
43. Implicit Deny Any
44. Inbound Traffic
45. Inheritance
46. Internal Firewall 
47. IP Camera 
48. Key Fob 
49. Keypad 
50. Macro 
51. Malicious Employee 
52. Malicious User 
53. Malware
54. Man-In-The-Middle
55. Reddit effect 
56. Quarantine network
57. Proximity reader
58. Posture assessment 
59. Pashing 
60. Persistent agent
61. Permanent dos
62. Outbound traffic
63. OUI 
64. Ntpdc
65. Non-persistent agent 
66. Network closet
67.Network based firewall
68. Anti-malware
69. Nac
70. Mon list
71. Mantrap 
72. Reflection
73. Threat
74. TEMPEST 
75. Tail gating 
76. Stateless inspection
77. Stateful inspection 
78. Spyware
79. Spoofing 
80. Reflection 
81. RF emanation
82. Rootkit 
83. Security Guard
84. Services 
85. Session Hijacking 
86. Signature 
87. Slash dotting 
88. Social Engineering 
89. SOHO firewall
90. Smurf attack 
91. Traffic spike
92. Trojan horse
93. Trusted user 
94. Unencrypted user
95. Unified Threat Management (UTM) 
96. Untrusted user
97. Video monitoring
98. Virus
99. Virus shield
100.  VLAN hopping 
101.  Vulnerability 
102. Worm
103. Zero-day attack
104. zombie