Logical Device and Network Security Concepts Flashcards
How are certificates used in authentication
Certificates are used in authentication to verify a user’s or device’s identity by using digital certificates
What is port security on a network?
Port security is the process of restricting access to a network by limiting which devices can connect to the network, and how they can connect. Only specific devices or MAC addresses can access it. It is a way of controlling which devices can access the network.
What is MAC filtering?
MAC filtering is a network security method that controls access to a network by filtering devices based on their Media Access Control (MAC) addresses.
What is used to protect from Malware?
Antivirus software is used to protect devices from malware, which is malicious software that can destroy data, slow down or crash a device, or allow spammers to send email
What are Malware signatures?
Anti-Malware/Anti-Virus gets malware signature updates at regular intervals to make sure that it can scan for the newest threats.
What is real-time protection?
a proactive defense mechanism that monitors your device for malicious activity in real-time.
What is response configuration?
Response configuration in anti-virus refers to how the anti-virus software is set up to take action when it detects a threat.
Management
Workgroup (decentralized, not scalable to more than 10 machines).
Domain (centralized, scalable to larger numbers of machines).
Mobile Device Management.