Match the following terms with their definitions:
Term | Definition |
___ 1. Vulnerability | a. Code that corrects a flaw in a program |
___ 2. Exploit | b. Verification of claimed identity |
___ 3. Authentication | c. The firewall technique that filters traffic by examining only the information in packet headers to the rules in an ACL |
___ 4. Authorization | d. A flaw or weakness in a program |
___ 5. Demilitarized zone (DMZ) | e. A test that determines the time it takes to compromise a system |
___ 6. Deep packet inspection | f. A subnetwork that is accessible from the Internet but separate from the organization's internal network |
___ 7. Router | g. The device that connects the organization to the Internet |
___ 8. Social engineering | h. The process of running multiple machines on one physical server |
___ 9. Firewall | i. An arrangement whereby a user remotely accesses software, hardware, or other resources via a browser |
___ 10. Hardening | j. An attack that involves deception to obtain access |
___ 11. CIRT | k. A device that provides perimeter security by filtering packets |
___ 12. Patch | l. The set of employees assigned responsibility for resolving problems and incidents |
___ 13. Virtualization | m. Restricting the actions that a user is permitted to perform |
___ 14. Change control and change management | n. Improving security by removal or disabling of unnecessary programs and features |
___ 15. Packet filtering | o. A device that uses the Internet Protocol (IP) to send packets across networks |
___ 16. Border router | p. A detective control that identifies weaknesses in devices or software |
___ 17. Vulnerability scan | q. A plan to ensure that modifications to an information system do not reduce its security |
___ 18. Penetration test | r. The process of applying code supplied by a vendor to fix a problem in that vendor's software |
___ 19. Patch management | s. Software code that can be used to take advantage of a flaw and compromise a system |
___ 20. Cloud computing | t. A firewall technique that filters traffic by examining not just packet header information but also the contents of a packet |
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.