Deck 11: Managing a Wireless LAN

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is NOT a component of using SNMP for network monitoring?

A) software agent
B) MIB
C) management station
D) event log
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
One of the goals of a security policy is to implement control.
سؤال
Successful social engineering attacks rely on the weakness of people.
سؤال
A threat agent is software installed on a computer that monitors for potential threats to the computer.
سؤال
Which form of social engineering often takes place as an e-mail message falsely claiming to be from a legitimate sender in an attempt to get private information?

A) exploitation
B) phishing
C) sandbagging
D) hacking
سؤال
Which of the following are NOT among the several defenses against attacks?

A) using security policies
B) security training
C) random employee security scans
D) physical security
سؤال
What is a difference between RMON and SNMP?

A) RMON uses MIBs
B) SNMP gathers network statistics
C) RMON uses dedicated devices
D) RMON is found on enterprise-level APs
سؤال
Which of the following is a flaw or weakness that allows an attacker to bypass security?

A) exploiting
B) vulnerability
C) threat agent
D) risk
سؤال
As an insurance company,the customer data that you store on your servers should be considered which of the following?

A) threat
B) vulnerability
C) risk
D) asset
سؤال
What does an updated enterprise-level AP use to distribute the latest update to other APs on the WLAN?

A) IP multicast
B) TCP unicast
C) Data Link broadcast
D) UDP simulcast
سؤال
Risk mitigation involves determining the damage that would result from an attack and the likelihood that the vulnerability is a risk to the organization.
سؤال
Which of the following is NOT typically included in an impact analysis?

A) asset identification
B) remediation process
C) threat evaluation
D) risk mitigation
سؤال
Which of the following is true of security policies?

A) users will always comply with the policies
B) once a policy is in affect,monitoring is not necessary
C) policies should not be too restrictive
D) users accept that security policies enhance their productivity
سؤال
The point of RF site tuning is to locate where APs should be mounted.
سؤال
What is the first phase of the development of a security policy likely to involve?

A) remediation of employees that violate the policy
B) review of the policy for compliance
C) vulnerability assessment
D) an outline of how the organization will respond to attacks
سؤال
Which type of policy defines the actions users may perform while accessing the network?

A) acceptable use policy
B) password policy
C) system-specific policy
D) physical device policy
سؤال
Which of the following is NOT an option when dealing with risk?

A) accept the risk
B) exploit the risk
C) diminish the risk
D) transfer the risk
سؤال
What is the most common method for updating an AP's capabilities?

A) installing a new EEPROM
B) downloading new firmware
C) sending the AP back to the manufacturer
D) rebooting with a new installation CD
سؤال
Impersonation falls into which category of attack?

A) man-in-the-middle
B) virus
C) social engineering
D) Trojan horse
سؤال
Which best describes kinesthetic learners?

A) learn by watching presentations
B) work well with hands-on environments
C) learn best through lectures
D) tend to like taking notes
سؤال
List and describe three RF site tuning settings.
سؤال
List three types of security policy.
سؤال
In order to use SNMP,a software ____________________ is loaded onto each network device that will be managed using SNMP.
سؤال
____________________ is software that is embedded into hardware to control the device.
سؤال
What are the two aspects of procedural security defenses?
سؤال
Which of the following are functions an organization's security policy can serve? (Choose all that apply.)

A)describe an overall intention and direction
B)detail specific risks
C)help to instill security awareness
D)dictate the tools the IT department must use to maintain security
سؤال
Describe social engineering.
سؤال
Although data from the access point and devices can be beneficial,there are drawbacks to relying solely on these sources of information.What are the drawbacks?
سؤال
What is RMON?
سؤال
What are frequently the weakest link in information security?

A) wireless networks
B) passwords
C) unmanaged switches
D) malfunctioning routers
سؤال
Which of the following types of information can you expect from an enterprise-level AP?

A)DNS query attempts
B)event log
C)routing table data
D)wireless transmission statistics
سؤال
List the five assessments involved in creating a vulnerability assessment.
سؤال
A ___________________ assessment attempts to identify what needs to be protected,what the pressures are against it,and how susceptible the current protection is.
سؤال
Which of the following are drawbacks of relying solely on wireless devices and APs as sources network monitoring information?

A)data collection can be time consuming
B)data is not gathered in real time
C)gathered data may not be timely
D)data retention can be difficult
سؤال
Provide a thorough definition of security policy.
سؤال
Many enterprise-level access points provide utilities that offer three types of information.What are they?
سؤال
____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.
سؤال
____________________ is a nonvolatile storage chip that uses byte-wise writable memories.
سؤال
Which of the following are RF site tuning settings? (Choose all that apply.)

A)adjust transmission frequency
B)adjust radio power levels on APs
C)adjust channel settings
D)validate coverage area
سؤال
What is the final phase of developing a security policy?
سؤال
Match between columns
the task of identifying and categorizing assets
exploiting
the task of identifying and categorizing assets
MIB
the task of identifying and categorizing assets
threat
the task of identifying and categorizing assets
impact analysis
the task of identifying and categorizing assets
acceptable use policy
the task of identifying and categorizing assets
asset management
the task of identifying and categorizing assets
RF site tuning
the task of identifying and categorizing assets
event log
the task of identifying and categorizing assets
risk
the task of identifying and categorizing assets
vulnerability
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
exploiting
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
MIB
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
threat
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
impact analysis
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
acceptable use policy
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
asset management
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
RF site tuning
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
event log
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
risk
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
vulnerability
a policy that defines the actions users may perform while accessing systems and networking equipment
exploiting
a policy that defines the actions users may perform while accessing systems and networking equipment
MIB
a policy that defines the actions users may perform while accessing systems and networking equipment
threat
a policy that defines the actions users may perform while accessing systems and networking equipment
impact analysis
a policy that defines the actions users may perform while accessing systems and networking equipment
acceptable use policy
a policy that defines the actions users may perform while accessing systems and networking equipment
asset management
a policy that defines the actions users may perform while accessing systems and networking equipment
RF site tuning
a policy that defines the actions users may perform while accessing systems and networking equipment
event log
a policy that defines the actions users may perform while accessing systems and networking equipment
risk
a policy that defines the actions users may perform while accessing systems and networking equipment
vulnerability
taking advantage of a vulnerability
exploiting
taking advantage of a vulnerability
MIB
taking advantage of a vulnerability
threat
taking advantage of a vulnerability
impact analysis
taking advantage of a vulnerability
acceptable use policy
taking advantage of a vulnerability
asset management
taking advantage of a vulnerability
RF site tuning
taking advantage of a vulnerability
event log
taking advantage of a vulnerability
risk
taking advantage of a vulnerability
vulnerability
a type of action that has the potential to cause harm
exploiting
a type of action that has the potential to cause harm
MIB
a type of action that has the potential to cause harm
threat
a type of action that has the potential to cause harm
impact analysis
a type of action that has the potential to cause harm
acceptable use policy
a type of action that has the potential to cause harm
asset management
a type of action that has the potential to cause harm
RF site tuning
a type of action that has the potential to cause harm
event log
a type of action that has the potential to cause harm
risk
a type of action that has the potential to cause harm
vulnerability
the likelihood that a threat agent will exploit a vulnerability
exploiting
the likelihood that a threat agent will exploit a vulnerability
MIB
the likelihood that a threat agent will exploit a vulnerability
threat
the likelihood that a threat agent will exploit a vulnerability
impact analysis
the likelihood that a threat agent will exploit a vulnerability
acceptable use policy
the likelihood that a threat agent will exploit a vulnerability
asset management
the likelihood that a threat agent will exploit a vulnerability
RF site tuning
the likelihood that a threat agent will exploit a vulnerability
event log
the likelihood that a threat agent will exploit a vulnerability
risk
the likelihood that a threat agent will exploit a vulnerability
vulnerability
a flaw or weakness that allows a threat agent to bypass security
exploiting
a flaw or weakness that allows a threat agent to bypass security
MIB
a flaw or weakness that allows a threat agent to bypass security
threat
a flaw or weakness that allows a threat agent to bypass security
impact analysis
a flaw or weakness that allows a threat agent to bypass security
acceptable use policy
a flaw or weakness that allows a threat agent to bypass security
asset management
a flaw or weakness that allows a threat agent to bypass security
RF site tuning
a flaw or weakness that allows a threat agent to bypass security
event log
a flaw or weakness that allows a threat agent to bypass security
risk
a flaw or weakness that allows a threat agent to bypass security
vulnerability
a record of events
exploiting
a record of events
MIB
a record of events
threat
a record of events
impact analysis
a record of events
acceptable use policy
a record of events
asset management
a record of events
RF site tuning
a record of events
event log
a record of events
risk
a record of events
vulnerability
adjustments to a WLAN performed as part of routine maintenance
exploiting
adjustments to a WLAN performed as part of routine maintenance
MIB
adjustments to a WLAN performed as part of routine maintenance
threat
adjustments to a WLAN performed as part of routine maintenance
impact analysis
adjustments to a WLAN performed as part of routine maintenance
acceptable use policy
adjustments to a WLAN performed as part of routine maintenance
asset management
adjustments to a WLAN performed as part of routine maintenance
RF site tuning
adjustments to a WLAN performed as part of routine maintenance
event log
adjustments to a WLAN performed as part of routine maintenance
risk
adjustments to a WLAN performed as part of routine maintenance
vulnerability
the storage area in which SNMP software agents store their data
exploiting
the storage area in which SNMP software agents store their data
MIB
the storage area in which SNMP software agents store their data
threat
the storage area in which SNMP software agents store their data
impact analysis
the storage area in which SNMP software agents store their data
acceptable use policy
the storage area in which SNMP software agents store their data
asset management
the storage area in which SNMP software agents store their data
RF site tuning
the storage area in which SNMP software agents store their data
event log
the storage area in which SNMP software agents store their data
risk
the storage area in which SNMP software agents store their data
vulnerability
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/41
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Managing a Wireless LAN
1
Which of the following is NOT a component of using SNMP for network monitoring?

A) software agent
B) MIB
C) management station
D) event log
D
2
One of the goals of a security policy is to implement control.
True
3
Successful social engineering attacks rely on the weakness of people.
True
4
A threat agent is software installed on a computer that monitors for potential threats to the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which form of social engineering often takes place as an e-mail message falsely claiming to be from a legitimate sender in an attempt to get private information?

A) exploitation
B) phishing
C) sandbagging
D) hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following are NOT among the several defenses against attacks?

A) using security policies
B) security training
C) random employee security scans
D) physical security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
7
What is a difference between RMON and SNMP?

A) RMON uses MIBs
B) SNMP gathers network statistics
C) RMON uses dedicated devices
D) RMON is found on enterprise-level APs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is a flaw or weakness that allows an attacker to bypass security?

A) exploiting
B) vulnerability
C) threat agent
D) risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
9
As an insurance company,the customer data that you store on your servers should be considered which of the following?

A) threat
B) vulnerability
C) risk
D) asset
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
10
What does an updated enterprise-level AP use to distribute the latest update to other APs on the WLAN?

A) IP multicast
B) TCP unicast
C) Data Link broadcast
D) UDP simulcast
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
11
Risk mitigation involves determining the damage that would result from an attack and the likelihood that the vulnerability is a risk to the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is NOT typically included in an impact analysis?

A) asset identification
B) remediation process
C) threat evaluation
D) risk mitigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is true of security policies?

A) users will always comply with the policies
B) once a policy is in affect,monitoring is not necessary
C) policies should not be too restrictive
D) users accept that security policies enhance their productivity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
14
The point of RF site tuning is to locate where APs should be mounted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is the first phase of the development of a security policy likely to involve?

A) remediation of employees that violate the policy
B) review of the policy for compliance
C) vulnerability assessment
D) an outline of how the organization will respond to attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which type of policy defines the actions users may perform while accessing the network?

A) acceptable use policy
B) password policy
C) system-specific policy
D) physical device policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is NOT an option when dealing with risk?

A) accept the risk
B) exploit the risk
C) diminish the risk
D) transfer the risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is the most common method for updating an AP's capabilities?

A) installing a new EEPROM
B) downloading new firmware
C) sending the AP back to the manufacturer
D) rebooting with a new installation CD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
19
Impersonation falls into which category of attack?

A) man-in-the-middle
B) virus
C) social engineering
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which best describes kinesthetic learners?

A) learn by watching presentations
B) work well with hands-on environments
C) learn best through lectures
D) tend to like taking notes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
21
List and describe three RF site tuning settings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
22
List three types of security policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
23
In order to use SNMP,a software ____________________ is loaded onto each network device that will be managed using SNMP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
24
____________________ is software that is embedded into hardware to control the device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
25
What are the two aspects of procedural security defenses?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following are functions an organization's security policy can serve? (Choose all that apply.)

A)describe an overall intention and direction
B)detail specific risks
C)help to instill security awareness
D)dictate the tools the IT department must use to maintain security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
27
Describe social engineering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
28
Although data from the access point and devices can be beneficial,there are drawbacks to relying solely on these sources of information.What are the drawbacks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
29
What is RMON?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
30
What are frequently the weakest link in information security?

A) wireless networks
B) passwords
C) unmanaged switches
D) malfunctioning routers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following types of information can you expect from an enterprise-level AP?

A)DNS query attempts
B)event log
C)routing table data
D)wireless transmission statistics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
32
List the five assessments involved in creating a vulnerability assessment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
33
A ___________________ assessment attempts to identify what needs to be protected,what the pressures are against it,and how susceptible the current protection is.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following are drawbacks of relying solely on wireless devices and APs as sources network monitoring information?

A)data collection can be time consuming
B)data is not gathered in real time
C)gathered data may not be timely
D)data retention can be difficult
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
35
Provide a thorough definition of security policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
36
Many enterprise-level access points provide utilities that offer three types of information.What are they?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
37
____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
38
____________________ is a nonvolatile storage chip that uses byte-wise writable memories.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following are RF site tuning settings? (Choose all that apply.)

A)adjust transmission frequency
B)adjust radio power levels on APs
C)adjust channel settings
D)validate coverage area
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
40
What is the final phase of developing a security policy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
the task of identifying and categorizing assets
exploiting
the task of identifying and categorizing assets
MIB
the task of identifying and categorizing assets
threat
the task of identifying and categorizing assets
impact analysis
the task of identifying and categorizing assets
acceptable use policy
the task of identifying and categorizing assets
asset management
the task of identifying and categorizing assets
RF site tuning
the task of identifying and categorizing assets
event log
the task of identifying and categorizing assets
risk
the task of identifying and categorizing assets
vulnerability
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
exploiting
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
MIB
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
threat
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
impact analysis
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
acceptable use policy
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
asset management
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
RF site tuning
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
event log
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
risk
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
vulnerability
a policy that defines the actions users may perform while accessing systems and networking equipment
exploiting
a policy that defines the actions users may perform while accessing systems and networking equipment
MIB
a policy that defines the actions users may perform while accessing systems and networking equipment
threat
a policy that defines the actions users may perform while accessing systems and networking equipment
impact analysis
a policy that defines the actions users may perform while accessing systems and networking equipment
acceptable use policy
a policy that defines the actions users may perform while accessing systems and networking equipment
asset management
a policy that defines the actions users may perform while accessing systems and networking equipment
RF site tuning
a policy that defines the actions users may perform while accessing systems and networking equipment
event log
a policy that defines the actions users may perform while accessing systems and networking equipment
risk
a policy that defines the actions users may perform while accessing systems and networking equipment
vulnerability
taking advantage of a vulnerability
exploiting
taking advantage of a vulnerability
MIB
taking advantage of a vulnerability
threat
taking advantage of a vulnerability
impact analysis
taking advantage of a vulnerability
acceptable use policy
taking advantage of a vulnerability
asset management
taking advantage of a vulnerability
RF site tuning
taking advantage of a vulnerability
event log
taking advantage of a vulnerability
risk
taking advantage of a vulnerability
vulnerability
a type of action that has the potential to cause harm
exploiting
a type of action that has the potential to cause harm
MIB
a type of action that has the potential to cause harm
threat
a type of action that has the potential to cause harm
impact analysis
a type of action that has the potential to cause harm
acceptable use policy
a type of action that has the potential to cause harm
asset management
a type of action that has the potential to cause harm
RF site tuning
a type of action that has the potential to cause harm
event log
a type of action that has the potential to cause harm
risk
a type of action that has the potential to cause harm
vulnerability
the likelihood that a threat agent will exploit a vulnerability
exploiting
the likelihood that a threat agent will exploit a vulnerability
MIB
the likelihood that a threat agent will exploit a vulnerability
threat
the likelihood that a threat agent will exploit a vulnerability
impact analysis
the likelihood that a threat agent will exploit a vulnerability
acceptable use policy
the likelihood that a threat agent will exploit a vulnerability
asset management
the likelihood that a threat agent will exploit a vulnerability
RF site tuning
the likelihood that a threat agent will exploit a vulnerability
event log
the likelihood that a threat agent will exploit a vulnerability
risk
the likelihood that a threat agent will exploit a vulnerability
vulnerability
a flaw or weakness that allows a threat agent to bypass security
exploiting
a flaw or weakness that allows a threat agent to bypass security
MIB
a flaw or weakness that allows a threat agent to bypass security
threat
a flaw or weakness that allows a threat agent to bypass security
impact analysis
a flaw or weakness that allows a threat agent to bypass security
acceptable use policy
a flaw or weakness that allows a threat agent to bypass security
asset management
a flaw or weakness that allows a threat agent to bypass security
RF site tuning
a flaw or weakness that allows a threat agent to bypass security
event log
a flaw or weakness that allows a threat agent to bypass security
risk
a flaw or weakness that allows a threat agent to bypass security
vulnerability
a record of events
exploiting
a record of events
MIB
a record of events
threat
a record of events
impact analysis
a record of events
acceptable use policy
a record of events
asset management
a record of events
RF site tuning
a record of events
event log
a record of events
risk
a record of events
vulnerability
adjustments to a WLAN performed as part of routine maintenance
exploiting
adjustments to a WLAN performed as part of routine maintenance
MIB
adjustments to a WLAN performed as part of routine maintenance
threat
adjustments to a WLAN performed as part of routine maintenance
impact analysis
adjustments to a WLAN performed as part of routine maintenance
acceptable use policy
adjustments to a WLAN performed as part of routine maintenance
asset management
adjustments to a WLAN performed as part of routine maintenance
RF site tuning
adjustments to a WLAN performed as part of routine maintenance
event log
adjustments to a WLAN performed as part of routine maintenance
risk
adjustments to a WLAN performed as part of routine maintenance
vulnerability
the storage area in which SNMP software agents store their data
exploiting
the storage area in which SNMP software agents store their data
MIB
the storage area in which SNMP software agents store their data
threat
the storage area in which SNMP software agents store their data
impact analysis
the storage area in which SNMP software agents store their data
acceptable use policy
the storage area in which SNMP software agents store their data
asset management
the storage area in which SNMP software agents store their data
RF site tuning
the storage area in which SNMP software agents store their data
event log
the storage area in which SNMP software agents store their data
risk
the storage area in which SNMP software agents store their data
vulnerability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.