Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Cyber Security Matching
DNS Poisoning
The modification of name resultion information that should be in a DNS Server's cache
failover clusters
AKA High-availability clusters, these are designedc so that a secondary server can take over in the case that the primary one fails, with limited or no downtime
Port address translation (PAT)
Like NAT but translates both IP addresses and port numbers
application whitelisting
a method of restricting users to specific blank
biometrics
the science of recognizing humans based on one or more physical characteristics
Business to Consumer (B2C)
create an online storefront for customers to purchase goods and services directly from their website
Data Ownership
Personal Data belongs to the Employees
explicit allow
When an administrator sets a rule taht allows a specific type of traffic through a firewall, often with an ACL
implicit deny
Denies all traffic to a resource unless the users generating that traffic are specifically okayed
first responders
People who perform preliminary analysis of the incident data and determine whether the incident is an incident or just an event, and the criticality of the incident
0:00

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: MinaGracey