Dictionary attack
Explanation
.
Eavesdropping
Takes the permissions of the parent folder
Read-Only Domain Controller
7
Install a certificate from a trusted Certificate Authority (CA).
Save them to an encrypted file
Captures and analyzes network communication
Spam
Issued by a public certificate authority (CA)
Validates the sender
It translates public IP addresses to private addresses and vice versa.
The broadcast name of an access point
Windows updates for workstations and servers
Sending high volumes of e-mail
Apply a group policy
No change is needed
Tries all possible password variations
BitLocker
Fixes security holes
Theft
Storage of Web site passwords., Web sites to track browsing habits.
Stateful
Stateful inspection
Routing
RADIUS server
Obtain information by posing as a trustworthy entity
Spelling and grammar errors , . Threats of losing service
Close existing vulnerabilities
Read and execute, read, write, full control, modify, list folder contents
Rainbow table
Manages updates for Microsoft software
Service Set Identifier (SSID)
An offsite fire safe
Social engineering
WPA2-Personal
Disable folder sharing
A. Disable the guest account. . Rename the admin account
A firewall
Disable unused services
Obscures the true e-mail sender
Modify
Domain Controller
ActiveX controls
Telephone, Reverse social engineering, Waste management
Limit the privileges of software
Windows XP Professional Service Pack 3
Install anti-virus software.
Public key belongs to a sender.
Configuration
Inherit the destination folder's permissions
No change is needed.
Password complexity , Access to the Run... command
Install antivirus software on the computer
Change their passwords
Network Policy Server (NPS)
A back door
Hard to guess , Easy to remember
Brute force attacks
List system vulnerabilities
Implement account lockout policy.
Certificates
WPA2 PSK
Decrease the chances of a virus getting to a client machine
Network sniffers
InPrivate Filtering
Passwords from being reused immediately
Delete
Integrity
hardware firewall
Data Execution Prevention
Client isolation mode
The Authenticated Users group
802.1x, WPA2 Enterprise, RADIUS
Software firewall
Any session data from being stored on the computer.
Inventory the company's technology assets
Remote Assistance: Home/Work (Private)
Use your password reset disk. , Use your administrator account.
It provides a list of IP address ranges for particular domains so senders can be verified.
Prevent rogue wireless access points
A fingerprint and a pattern, A password and a smart card, A pin number and a debit card
Local policy
Secure replication
Windows Security Center
On-demand scanning , Scheduled scanning
Past passwords of users contained dictionary words.
Non-compliant systems from connecting to a network.
It is a logical broadcast domain across physical subnets.
Browser cookies, Website URL Login information
Active Directory Domains and Trusts
Forward Proxy Roaming Profiles