Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Chapter 5 Host, Application, and Data Security

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Access list   show
🗑
Access log   show
🗑
show Software that helps prevent computers from becoming infected by different types of spyware.  
🗑
show Software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus.  
🗑
show A log that can track user authentication attempts.  
🗑
show Logs that are the second common type of security-related operating system logs.  
🗑
show Bayesian filtering  
🗑
show Cable lock  
🗑
show Closed-circuit television (CCTV)  
🗑
show Cross-site request forgery (XSRF)  
🗑
A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users.   show
🗑
A door lock that extends a solid metal bar into the door frame for extra security.   show
🗑
show Errors (exceptions)  
🗑
show Event logs  
🗑
Securing a restricted area by erecting a barrier.   show
🗑
show Firewall (packet filter)  
🗑
show Fuzz testing (fuzzing)  
🗑
Using the Global Positioning System to detect the location of a portable device.   show
🗑
Creating a virtualized environment to simulate the central processing unit (CPU) and memory of the computer to check for the presence of a virus.   show
🗑
A firewall that runs as a program on a local system to protect it against attacks.   show
🗑
Software that addresses a specific customer situation and often may not be distributed outside that customer's organization.   show
🗑
show Input validation  
🗑
A secure storage unit that can be used for storing portable devices.   show
🗑
A record of events that occur.   show
🗑
A device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and nonsecure areas.   show
🗑
a general software security update intended to cover vulnerabilities that have been discovered.   show
🗑
show Pop-up blocker  
🗑
a device that detects an emitted signal in order to identify the owner.   show
🗑
show Remote wipe/sanitation  
🗑
A ruggedized steel box with a lock.   show
🗑
Logs that are considered the primary source of log data.   show
🗑
A document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.   show
🗑
Software that is a cumulative package of all security updates plus additional features.   show
🗑
show Signature file  
🗑
Using encryption to mask the content of voice communications.   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: 1592245141
Popular Computers sets