Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
Patch
|
Code that corrects a flaw in a program
|
|
Firewall
|
A device that provides perimeter security by filtering packets
|
|
Vulnerability Scan
|
A detective control that identifies weaknesses in devices or software
|
|
Transmission Control Protocol (TCP)
|
The rules (protocol) that govern the division of a large file into packets and subsequent reassembly of the file from those packets
|
|
Hardening
|
Improving security by removal or disabling of unnecessary programs and features
|
|
Exploit
|
Software code that can be used to take advantage of a flaw and compromise a system.
|
|
Internet Protocol
|
The rules (protocol) that govern routing of packets across networks.
|
|
Penetration test
|
A test to determine the time it takes to compromise a system.
|
|
Border router
|
The device that connects the organization to the internet.
|
|
Static packet filtering
|
A firewall technique that filters traffic by examining the packet header of a single packet in isolation.
|
|
Patch management
|
The process of applying code supplied by a vendor to fix a problem in that vendor's software.
|
|
CIRT
|
Set of employees assigned responsibility for resolving problems and incidents
|
|
Social Engineering
|
An attack that involves deception to obtain access.
|
|
Cloud computing
|
An arrangement whereby a user remotely accesses software, hardware, or other resources via browsers.
|
|
Virtualization
|
The process of running multiple machines on one physical server
|
|
Stateful packet filtering
|
The firewall technique that filters by comparing the information in packet headers to a table of established connections.
|
|
Vulnerability
|
A flaw or weakness in a program
|
|
Demiltarized Zone (DMZ)
|
A subnetwork that is accessible from the internet but separate from the organization's internal network.
|
|
Router
|
A device that uses the Internet Protocol (IP) to send packets across networks
|
|
Authentication
|
Verification of claimed identity
|
|
Deep packet inspection
|
A firewall technique that filters traffic by examining not just packet header information but also the contents of a packet.
|
|
Authorization
|
Restricting the actions that a user is permitted to perform.
|