Problem

Match the following terms with their definitions:TermDefinition___ 1. Vulnerabilitya. Code...

Match the following terms with their definitions:

Term

Definition

___ 1. Vulnerability

a. Code that corrects a flaw in a program

___ 2. Exploit

b. Verification of claimed identity

___ 3. Authentication

c. The firewall technique that filters traffic by examining only the information in packet headers to the rules in an ACL

___ 4. Authorization

d. A flaw or weakness in a program

___ 5. Demilitarized zone (DMZ)

e. A test that determines the time it takes to compromise a system

___ 6. Deep packet inspection

f. A subnetwork that is accessible from the Internet but separate from the organization's internal network

___ 7. Router

g. The device that connects the organization to the Internet

___ 8. Social engineering

h. The process of running multiple machines on one physical server

___ 9. Firewall

i. An arrangement whereby a user remotely accesses software, hardware, or other resources via a browser

___ 10. Hardening

j. An attack that involves deception to obtain access

___ 11. CIRT

k. A device that provides perimeter security by filtering packets

___ 12. Patch

l. The set of employees assigned responsibility for resolving problems and incidents

___ 13. Virtualization

m. Restricting the actions that a user is permitted to perform

___ 14. Change control and change management

n. Improving security by removal or disabling of unnecessary programs and features

___ 15. Packet filtering

o. A device that uses the Internet Protocol (IP) to send packets across networks

___ 16. Border router

p. A detective control that identifies weaknesses in devices or software

___ 17. Vulnerability scan

q. A plan to ensure that modifications to an information system do not reduce its security

___ 18. Penetration test

r. The process of applying code supplied by a vendor to fix a problem in that vendor's software

___ 19. Patch management

s. Software code that can be used to take advantage of a flaw and compromise a system

___ 20. Cloud computing

t. A firewall technique that filters traffic by examining not just packet header information but also the contents of a packet

Step-by-Step Solution

Request Professional Solution

Request Solution!

We need at least 10 more requests to produce the solution.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the solution will be notified once they are available.
Add your Solution
Textbook Solutions and Answers Search
Solutions For Problems in Chapter 8