• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
Patch
Code that corrects a flaw in a program
Firewall
A device that provides perimeter security by filtering packets
Vulnerability Scan
A detective control that identifies weaknesses in devices or software
Transmission Control Protocol (TCP)
The rules (protocol) that govern the division of a large file into packets and subsequent reassembly of the file from those packets
Hardening
Improving security by removal or disabling of unnecessary programs and features
Exploit
Software code that can be used to take advantage of a flaw and compromise a system.
Internet Protocol
The rules (protocol) that govern routing of packets across networks.
Penetration test
A test to determine the time it takes to compromise a system.
Border router
The device that connects the organization to the internet.
Static packet filtering
A firewall technique that filters traffic by examining the packet header of a single packet in isolation.
Patch management
The process of applying code supplied by a vendor to fix a problem in that vendor's software.
CIRT
Set of employees assigned responsibility for resolving problems and incidents
Social Engineering
An attack that involves deception to obtain access.
Cloud computing
An arrangement whereby a user remotely accesses software, hardware, or other resources via browsers.
Virtualization
The process of running multiple machines on one physical server
Stateful packet filtering
The firewall technique that filters by comparing the information in packet headers to a table of established connections.
Vulnerability
A flaw or weakness in a program
Demiltarized Zone (DMZ)
A subnetwork that is accessible from the internet but separate from the organization's internal network.
Router
A device that uses the Internet Protocol (IP) to send packets across networks
Authentication
Verification of claimed identity
Deep packet inspection
A firewall technique that filters traffic by examining not just packet header information but also the contents of a packet.
Authorization
Restricting the actions that a user is permitted to perform.