Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Cyber Security Test

Enter the letter for the matching Definition
incorrect
1.
hardware security module (HSM)
incorrect
2.
application containerization
incorrect
3.
incident response
incorrect
4.
Piggyback entry wiretapping
incorrect
5.
Intrusion Prevention System
incorrect
6.
Data Emanation
incorrect
7.
platform as a service
incorrect
8.
content filters
incorrect
9.
wardialer
incorrect
10.
authorization
incorrect
11.
vulnerability scanning
incorrect
12.
Information assurance (IA)
incorrect
13.
confidentiality
incorrect
14.
policy
incorrect
15.
transitive trust
incorrect
16.
vulnerability management
incorrect
17.
GNU Privacy Guard (GPG)
incorrect
18.
encryption
incorrect
19.
standby generator
incorrect
20.
firewall
A.
a virtualization method that allows an organization to run blank without launching an entire virtual machine. Also known simply as containerization
B.
intercepts and modifies the original message by breaking the communications line and routing the message to another computer that acts as a host
C.
systems that turn on automatically within seconds of a power outage
D.
the practice of finding and mitigating software vulnerabilities in networks and computers
E.
the process of changing information using an algorithm (or cipher) into another form that is unreadable by others - unless they possess the key to that data
F.
AKA Signal Emanation the electromagnetic field generated by a network cable/device which can be manipulated to eavesdrop on convos or steal data
G.
When a user is granted access to specific resources after authentication is complete
H.
a part of a computer system or network designed to block unauthorized access while permitting authorized communications. It permits or denies applications based on rules or other criteria
I.
can block malicious IPs
J.
A physical decice that deals with the encryption of authentication processes, digital signings, and payment processes,
K.
A free Alternativev to PGP that is compiant with OpenPGP
L.
a cloud computing service that provides various software solutions to organizations, especially the ability to develop applications without the cost or admin of a physical platform
M.
individual computer programs that block external files that use Javascript or images from loading into the browser
N.
a set of procedures that an investigator follows when examining a computer security incident.
O.
computer program that dials telephones numbers looking for a computer on the other end
P.
rules or guidelines used to guide decisions and achieve outcomes.
Q.
the act of scanning for weaknesses and susceptibilities in the network and individual systems
R.
the practice of managing risks that are related to computer hardware and software systems
S.
only authorized users can view information
T.
when two or more networks have a relationship where users from one network can gain access to resources on the other
Type the Term that corresponds to the displayed Definition.
incorrect
21.
part of an emergency power system used when there is an outage of regular electric grid power
incorrect
22.
in the context of firewalls, inspects each packet passing through the firewall and accepts or rejects it based on rules
incorrect
23.
the act of verifying whether a process is secure, for example, the secure boot process of a UEFI-based system
incorrect
24.
these are written instructions for how to use policies and and standards. Can include plan of action, installation, testing, and auditing
incorrect
25.
A password attack where every possible password is attempted
incorrect
26.
An Algorithm that can perform encryption or decryption
incorrect
27.
A type of algorithm that encrypts a number of bits as individual unites known as blocks
incorrect
28.
when a single private IP address translates to a single public IP address
incorrect
29.
The entity (usually a server) that issues digital certificates to users
incorrect
30.
The monitoring and detection of security events on a computer network and the execution of proper responses to those security events

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: MinaGracey