Match the following terms with their definitions: Term 1. Vulnerability 2. Exploit 3. Authentication 4. Authorization 5.

Question:

Match the following terms with their definitions:
Term
1. Vulnerability
2. Exploit
3. Authentication
4. Authorization
5. Demilitarized zone (DMZ)
6. Deep packet inspection
7. Router
8. Social engineering
9. Firewall
10. Hardening
11. CIRT
12. Patch
13. Virtualization
14. Transmission Control Protocol (TCP)
15. Static packet filtering
16. Border router
17. Vulnerability scan
18. Penetration test
19. Patch management
20. Cloud computing
Definition
a. Code that corrects a flaw in a program.
b. Verification of claimed identity.
c. The firewall technique that filters traffic by comparing the information in packet headers to a table of established connections.
d. A flaw or weakness in a program.
e. A test to determine the time it takes to compromise a system.
f. A subnetwork that is accessible from the Internet but separate from the organization's internal network.
g. The device that connects the organization to the Internet.
h. The rules (protocol) that govern routing of packets across networks.
i. The rules (protocol) that govern the division of a large file into packets and subsequent reassembly of the file from those packets.
j. An attack that involves deception to obtain access.
k. A device that provides perimeter security by filtering packets.
l. The set of employees assigned responsibility for resolving problems and incidents.
m. Restricting the actions that a user is permitted to perform.
n. Improving security by removal or disabling of unnecessary programs and features.
o. A device that uses the Internet Protocol (IP) to send packets across networks.
p. A detective control that identifies weaknesses in devices or software.
q. A firewall technique that filters traffic by examining the packet header of a single packet in isolation.
r. The process of applying code supplied by a vendor to fix a problem in that vendor's software.
s. Software code that can be used to take advantage of a flaw and compromise a system.
t. A firewall technique that filters traffic by examining not just packet header information but also the contents of a packet.
u. The process of running multiple machines on one physical server.
v. An arrangement whereby a user remotely accesses software, hardware, or other resources via a browser.
Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Accounting Information Systems

ISBN: 978-0132552622

12th edition

Authors: Marshall B. Romney, Paul J. Steinbart

Question Posted: