PERFORMANCE ASSESSMENT (PA) 2024/2025/LATEST UPDATE
FOR A+ GRADE
Network devices (correct answer) Switches, routers, and firewalls with access to data
Compromised device (correct answer) Device accessed by a malicious user or attacker
Wireless networks (correct answer) Networks vulnerable to attackers in close proximity
Hardening (correct answer) Process of securing and testing network devices
Default passwords (correct answer) Factory-set passwords that should be changed
Unnecessary logins (correct answer) Accounts not used by the network administrator
Strong password policy (correct answer) Requiring complex passwords and regular changes
Unnecessary services (correct answer) Optional features that increase the risk of attack
Patching (correct answer) Installing security updates to fix vulnerabilities
Physical access (correct answer) Ability to physically interact with a device
Trusted network (correct answer) Network authorized to make changes to a device
Wireless network encryption (correct answer) Configuring WPA2 or WPA3 for secure traffic
, Audit logs (correct answer) Records of device activity for analysis and detection
Backup (correct answer) Creating copies of device configurations for restoration
Authentication (correct answer) Process of confirming a person's identity
Microsoft Active Directory (correct answer) Authentication system that confirms user identity via
passwords
Public Key Infrastructure (PKI) (correct answer) Authentication system that uses certificates to validate
website identity
Authorization (correct answer) Determines what a user may access after authentication
Restrictive Permissions (correct answer) Applying limited access to data and securing servers and
network devices
Data Leaks (correct answer) Risk of unauthorized access to confidential data
Malware Infection (correct answer) Accidental infection of network data files by a user's infected
computer
AAA Interaction (correct answer) Client communication with a radius server via the cloud
Accounting (correct answer) Process of verifying access control settings and providing a forensic trail
Immutable Logs (correct answer) Audit logs stored in an unchangeable form to prevent tampering
MFA (correct answer) Multi-factor authentication, an optional add-on to the authentication process