Information Security Control

¡Supera tus tareas y exámenes ahora con Quizwiz!

The _____ hat hackers are Ethical Hackers who have the support of government and industry.

White

A _____ hacker may try to gain access to a system without permission, but in general, without malice. Often, they will notify an organization in some manner that their system was vulnerable.

Grey

A _______ is a statistical method that works by looking for predictive patterns, and then changes the state accordingly.

Hidden Markov Model

_____ threat management devices provide firewall functions, intrusion prevention, antivirus, data loss prevention along with content filtering.

Unified

The steps to take after an incident include: Identify, respond, consider possible causes, _____, and resolve and document.

develop a solution

A _____is a hardware or software-based mechanism that controls in-coming and out-going traffic based on a set of rules that either permit or deny traffic on a network or host, and provide access control and active filtering.

firewall

A(n) _____ is an unplanned occurrence that disrupts operational or day to day activities.

incident


Conjuntos de estudio relacionados

Data Resource Management Exam 1 Chapter 5

View Set

Human Capital: INVESTMENTS (Before Midterm)

View Set

Life Insurance Quiz Practice Questions

View Set

Ch58: Disorders of the Kidneys and Ureters

View Set

Chapt 14 Ancient Mediterrranean Worlds

View Set