Chapter 5 Host, Application, and Data Security
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Access list | show 🗑
|
||||
Access log | show 🗑
|
||||
show | Software that helps prevent computers from becoming infected by different types of spyware.
🗑
|
||||
show | Software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus.
🗑
|
||||
show | A log that can track user authentication attempts.
🗑
|
||||
show | Logs that are the second common type of security-related operating system logs.
🗑
|
||||
show | Bayesian filtering
🗑
|
||||
show | Cable lock
🗑
|
||||
show | Closed-circuit television (CCTV)
🗑
|
||||
show | Cross-site request forgery (XSRF)
🗑
|
||||
A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users. | show 🗑
|
||||
A door lock that extends a solid metal bar into the door frame for extra security. | show 🗑
|
||||
show | Errors (exceptions)
🗑
|
||||
show | Event logs
🗑
|
||||
Securing a restricted area by erecting a barrier. | show 🗑
|
||||
show | Firewall (packet filter)
🗑
|
||||
show | Fuzz testing (fuzzing)
🗑
|
||||
Using the Global Positioning System to detect the location of a portable device. | show 🗑
|
||||
Creating a virtualized environment to simulate the central processing unit (CPU) and memory of the computer to check for the presence of a virus. | show 🗑
|
||||
A firewall that runs as a program on a local system to protect it against attacks. | show 🗑
|
||||
Software that addresses a specific customer situation and often may not be distributed outside that customer's organization. | show 🗑
|
||||
show | Input validation
🗑
|
||||
A secure storage unit that can be used for storing portable devices. | show 🗑
|
||||
A record of events that occur. | show 🗑
|
||||
A device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and nonsecure areas. | show 🗑
|
||||
a general software security update intended to cover vulnerabilities that have been discovered. | show 🗑
|
||||
show | Pop-up blocker
🗑
|
||||
a device that detects an emitted signal in order to identify the owner. | show 🗑
|
||||
show | Remote wipe/sanitation
🗑
|
||||
A ruggedized steel box with a lock. | show 🗑
|
||||
Logs that are considered the primary source of log data. | show 🗑
|
||||
A document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure. | show 🗑
|
||||
Software that is a cumulative package of all security updates plus additional features. | show 🗑
|
||||
show | Signature file
🗑
|
||||
Using encryption to mask the content of voice communications. | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
1592245141
Popular Computers sets