Question: Match the following terms with theirdefinitions: Term Definition 1. Vulnerablitya. Code that corrects a flaw in a program -2. Exploit b. Verification of claimed identity
.png)
Term Definition 1. Vulnerablitya. Code that corrects a flaw in a program -2. Exploit b. Verification of claimed identity 3. Authentication The firewall technique that filters traffic by examining only the information in packet headers to the rules in an ACL c 4. Authorization 5. Demilitarized zone (DMZ) d. A flaw or weakness in a program A test that determines the time it takes to compromise a systen e. 6. Deep packe f. A subnetwork that is accessible from the Internet but inspection separate from the organization's internal network -7. Router The device that connects the organization to the Internet g. 8. Social h. The process of running multiple machines on one physical server An arrangement whereby a user remotely accesses software, hardware, or other resources vi browser engieering 9. Firewall i. a a 10. Hardening 11. CIRT j. An attack that involves deception to obtain access k. A device that provides perimeter security by filtering packets 12. Patch 1. The set of employces assigned responsibility for resolving problems and incidents 13. Virtualization Restricting the actions that a user is permitted to perform 14. Change control . Improving security by removal or disabling of and change management unnecessary programs and features 15. Packet filtering. A device that uses the Internet Protocol (IP) to send 16. Border router P 17. Vulnerability q. A plan to ensure that modifications to an information 18. Penetration test r. The apply 19. Patch packets across networks A detective control that identifies weaknesses inn devices or softwaTE scan system do not reduce its security process of applying code supplied by a vender to fix a problem in that vendor's software Software code that can be used to take advantage of a flaw and compromise a system A firewall technique that filters traffic by examining not just packet header information but also the contents of a packet s. management 0. Cloud computing t.
Step by Step Solution
3.21 Rating (162 Votes )
There are 3 Steps involved in it
Term Definition d 1 Vulnerability a Code that corrects a flaw in a program s 2 Exploit b Verificatio... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
373-B-A-I-S (4865).docx
120 KBs Word File
