Package deal
Bundle for CYSE Tests Compilation | Updated
Bundle for CYSE Tests Compilation | Updated
[Show more]Bundle for CYSE Tests Compilation | Updated
[Show more]What Kismet used for? - Finding wireless access points even when attempts have 
made it difficult to do so. 
What is the concept of network segmentation and why do it? - Divide networks into 
subnets. 
Do this for controlling network traffic. 
Boost Performance. 
Troubleshooting network issues. 
Why...
Preview 2 out of 6 pages
Add to cartWhat Kismet used for? - Finding wireless access points even when attempts have 
made it difficult to do so. 
What is the concept of network segmentation and why do it? - Divide networks into 
subnets. 
Do this for controlling network traffic. 
Boost Performance. 
Troubleshooting network issues. 
Why...
What is access control? - A security technique that regulates who or what can view 
or use resources in a computing environment 
It enables administrators to manage access at a more granular level 
Authentication - Authentication is the step after identification 
It is to determine whether the claim...
Preview 4 out of 52 pages
Add to cartWhat is access control? - A security technique that regulates who or what can view 
or use resources in a computing environment 
It enables administrators to manage access at a more granular level 
Authentication - Authentication is the step after identification 
It is to determine whether the claim...
For what might we use the tool Kismet? - We 
might use the tool Kismet to detect wireless devices. 
More specifically it is commonly used to detect 
wireless access points. 
Explain the concept of segmentation and why it 
might be done.* - The concept of segmentation is 
taking a network and dividin...
Preview 2 out of 5 pages
Add to cartFor what might we use the tool Kismet? - We 
might use the tool Kismet to detect wireless devices. 
More specifically it is commonly used to detect 
wireless access points. 
Explain the concept of segmentation and why it 
might be done.* - The concept of segmentation is 
taking a network and dividin...
How does the principle of least privilege apply to operating system hardening? - 
prevents attack actions that require administrator or root privilege 
What is the difference between a port scanner and a vulnerability assessment tool? - 
port scanners discover listening ports; vulnerability assessme...
Preview 2 out of 5 pages
Add to cartHow does the principle of least privilege apply to operating system hardening? - 
prevents attack actions that require administrator or root privilege 
What is the difference between a port scanner and a vulnerability assessment tool? - 
port scanners discover listening ports; vulnerability assessme...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller AmazingGrace. Stuvia facilitates payment to the seller.
No, you only buy these notes for $14.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
75323 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now