A(n) ______ is a basic security device that filters traffic and is a barrier between a network and the outside world or between a system and other systems.
A(n) hides the internal network’s IP address and presents a…
A(n) hides the internal network’s IP address and presents a single IP address to the outside world.
Which of these is a repository of security-related documenta…
Which of these is a repository of security-related documentation and also sponsors a number of security research projects?
Any person or thing that acts (or has the power to act) to c…
Any person or thing that acts (or has the power to act) to cause, carry, transmit, or support a threat. Examples are malicious hackers, organized crime, insiders (including system administrators and developers), terrorists, and nation states.
Which is the risk analysis method that applies a subjective…
Which is the risk analysis method that applies a subjective assessment of risk occurrence likelihood (probability) against the potential severity of the risk outcomes (impact) to determine the overall severity of a risk?
What are the different control types?
What are the different control types?
An action, potential action, or inaction, likely to cause da…
An action, potential action, or inaction, likely to cause damage, harm or loss. These can be external or internal, and intentional or unintentional.
The technique for breaching a system’s security by exploitin…
The technique for breaching a system’s security by exploiting human nature rather than technology is war-driving.
What is the name of the assessment that you must perform bef…
What is the name of the assessment that you must perform before you create your BCP (business continuity plan)?
Which type of hacking occurs when the attacker monitors an a…
Which type of hacking occurs when the attacker monitors an authenticated session between the client and the server and takes over that session?