The first responder to a security incident determines the situation requires escalation. Consider the following and select the the scenario that best describes escalation in this situation.
A(n) __________ is a private data network that makes use of…
A(n) __________ is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.
________ detection looks for specific patterns in the networ…
________ detection looks for specific patterns in the network traffic to identify a threat.
An attacker types more data in a field than the programmer e…
An attacker types more data in a field than the programmer expected. This is a(n) ________ attack.
__________________ uses a victim’s computing power to genera…
__________________ uses a victim’s computing power to generate cryptocurrency.
The difference between a Trojan Horse and a Worm is that the…
The difference between a Trojan Horse and a Worm is that the Worm self-replicates while the Trojan Horse does not.
A ________ firewall handling all traditional firewall functi…
A ________ firewall handling all traditional firewall functions (SPI, ACLs, etc.) as well as additional security functions such as antivirus filtering, spam filtering, application proxy filtering, and so forth.
__________ is software that is installed automatically to di…
__________ is software that is installed automatically to display advertising material to online users.
A ________ is a mathematical process used in encryption and…
A ________ is a mathematical process used in encryption and decryption.
Dropping all future packets from a particular IP address is…
Dropping all future packets from a particular IP address is called ________.