Question: Match the following terms with theirdefinitions: Term Definition 1. Vulnerablitya. Code that corrects a flaw in a program -2. Exploit b. Verification of claimed identity

Match the following terms with theirdefinitions:
Match the following terms with their definitions:

Term Definition 1. Vulnerablitya. Code that corrects a flaw in a program -2. Exploit b. Verification of claimed identity 3. Authentication The firewall technique that filters traffic by examining only the information in packet headers to the rules in an ACL c 4. Authorization 5. Demilitarized zone (DMZ) d. A flaw or weakness in a program A test that determines the time it takes to compromise a systen e. 6. Deep packe f. A subnetwork that is accessible from the Internet but inspection separate from the organization's internal network -7. Router The device that connects the organization to the Internet g. 8. Social h. The process of running multiple machines on one physical server An arrangement whereby a user remotely accesses software, hardware, or other resources vi browser engieering 9. Firewall i. a a 10. Hardening 11. CIRT j. An attack that involves deception to obtain access k. A device that provides perimeter security by filtering packets 12. Patch 1. The set of employces assigned responsibility for resolving problems and incidents 13. Virtualization Restricting the actions that a user is permitted to perform 14. Change control . Improving security by removal or disabling of and change management unnecessary programs and features 15. Packet filtering. A device that uses the Internet Protocol (IP) to send 16. Border router P 17. Vulnerability q. A plan to ensure that modifications to an information 18. Penetration test r. The apply 19. Patch packets across networks A detective control that identifies weaknesses inn devices or softwaTE scan system do not reduce its security process of applying code supplied by a vender to fix a problem in that vendor's software Software code that can be used to take advantage of a flaw and compromise a system A firewall technique that filters traffic by examining not just packet header information but also the contents of a packet s. management 0. Cloud computing t.

Step by Step Solution

3.21 Rating (162 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Term Definition d 1 Vulnerability a Code that corrects a flaw in a program s 2 Exploit b Verificatio... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

373-B-A-I-S (4865).docx

120 KBs Word File

Students Have Also Explored These Related Accounting Questions!