Cyber Security Test
Enter the letter for the matching Definition
| A. a virtualization method that allows an organization to run blank without launching an entire virtual machine. Also known simply as containerizationB. intercepts and modifies the original message by breaking the communications line and routing the message to another computer that acts as a hostC. systems that turn on automatically within seconds of a power outageD. the practice of finding and mitigating software vulnerabilities in networks and computersE. the process of changing information using an algorithm (or cipher) into another form that is unreadable by others - unless they possess the key to that dataF. AKA Signal Emanation the electromagnetic field generated by a network cable/device which can be manipulated to eavesdrop on convos or steal dataG. When a user is granted access to specific resources after authentication is completeH. a part of a computer system or network designed to block unauthorized access while permitting authorized communications. It permits or denies applications based on rules or other criteriaI. can block malicious IPsJ. A physical decice that deals with the encryption of authentication processes, digital signings, and payment processes,K. A free Alternativev to PGP that is compiant with OpenPGPL. a cloud computing service that provides various software solutions to organizations, especially the ability to develop applications without the cost or admin of a physical platformM. individual computer programs that block external files that use Javascript or images from loading into the browserN. a set of procedures that an investigator follows when examining a computer security incident.O. computer program that dials telephones numbers looking for a computer on the other endP. rules or guidelines used to guide decisions and achieve outcomes. Q. the act of scanning for weaknesses and susceptibilities in the network and individual systemsR. the practice of managing risks that are related to computer hardware and software systemsS. only authorized users can view informationT. when two or more networks have a relationship where users from one network can gain access to resources on the other |
Type the Term that corresponds to the displayed Definition.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
MinaGracey