Question

Lesson 2 – Cybersecurity Terminology Term / Concept 2FA (2-Factor Authentication) APT (Advanced Persistent Threat) Breach...

Lesson 2 – Cybersecurity Terminology

Term / Concept

  1. 2FA (2-Factor Authentication)
  1. APT (Advanced Persistent Threat)
  1. Breach
  1. Cyberattack
  1. Data breach
  1. Endpoint security
  1. Hardening
  1. IDS (Intrusion Detection System)
  1. Least privilege
  1. Malware
  1. Patch management
  1. Penetration testing
  1. Proxy server
  1. Risk
  1. Security policy
  1. Social engineering
  1. Threat
  1. Threat vector
  1. Trusted network
  1. Vulnerability

Description / Definition

  1. Requires two pieces of evidence or credentials to gain access to an account or other secure/restricted area.
  1. A set of hacking processes targeting a specific entity –usually nations or organizations attacking for business or political motives.
  1. An incident that results in the disclosure or exposure of data.
  1. Internal data being made accessible to external entities without authorization.
  1. Protecting a corporate network from access by end users and remote devices.
  1. An attacker executes malicious programs on a compromised system
  1. Identifying and fixing vulnerabilities on a system.
  1. A security system that gathers, analyzes and reports on possible security breaches in progress
  1. Assigning users the least amount of permissions necessary to perform their function.
  1. Any type of program used to perform malicious actions
  1. An activity of researching, testing, approving and installing updates to computer systems.
  1. An authorized, simulated attack exercise that evaluate the security of IT infrastructures.
  1. A server that intercepts client requests and forwards them to another server.
  1. The product of the level of threat with the level of vulnerability that indicates the likelihood of a successful attack.
  • Rules specifying or regulating how an organization’s security services to protect sensitive and critical resources.
  1. A cyber-attack to deceive victims into taking an action that places a victim at risk.
  1. The potential that a circumstance, capability, action, or event could breach security and cause harm.
  1. The method a threat uses to get to a target.
  1. The private network a firewall primarily protects.
  1. A flaw that creates the opportunity for an unauthorized access and attack.

Match

  1. A
  1. D
  1. E
  1. G
  1. H
  1. I
  1. J
  1. K
  1. L
  1. M
  1. O
  1. S
  1. T

Missing numbers # 3, 4, 5, 14, 16,17,18

Homework Answers

Answer #1
2FA (2-Factor Authentication) Requires two pieces of evidence or credentials to gain access to an account or other secure/restricted area.
APT (Advanced Persistent Threat)             A set of hacking processes targeting a specific entity –usually nations or organizations attacking for business or political motives.
Breach                                       Internal data being made accessible to external entities without authorization.
Cyberattack                                  An attacker executes malicious programs on a compromised system
Data breach                                  An incident that results in the disclosure or exposure of data.
Endpoint security                            Protecting a corporate network from access by end users and remote devices.
Hardening                                    Identifying and fixing vulnerabilities on a system.
IDS (Intrusion Detection System)             A security system that gathers, analyzes and reports on possible security breaches in progress
Least privilege                              Assigning users the least amount of permissions necessary to perform their function.
Malware                                      Any type of program used to perform malicious actions
Patch management                             An activity of researching, testing, approving and installing updates to computer systems.
Penetration testing                          An authorized, simulated attack exercise that evaluate the security of IT infrastructures.
Proxy server                                 A server that intercepts client requests and forwards them to another server.
Risk                                         The product of the level of threat with the level of vulnerability that indicates the likelihood of a successful attack.
Security policy                              Rules specifying or regulating how an organization’s security services to protect sensitive and critical resources.
Social engineering                           A cyber-attack to deceive victims into taking an action that places a victim at risk.
Threat                                       The potential that a circumstance, capability, action, or event could breach security and cause harm.
Threat vector                                The method a threat uses to get to a target.
Trusted network                              The private network a firewall primarily protects.
Vulnerability                                A flaw that creates the opportunity for an unauthorized access and attack.
Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
58. Question 58 Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3) 1...
58. Question 58 Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3) 1 point Virus Protection Identity and Access Management Spam Filter Application Firewall 59. Question 59 A robust cybersecurity defense includes contributions from 3 areas, human expertise, security analytics and artificial intelligence. Which of these areas would contain the ability for unstructured analysis? 1 point Human expertise Artificial intelligence Security analytics 60. Question 60 How would a SIEM flag a user who is trying to log...
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application...
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application Security Testing. IAST Interactive Application Security Testing. PAST: Passive Application Security Testing. DAST: Dynamic Security Application Testing. 57. Question 57 Which one of the OWASP Top 10 Application Security Risks would be occur when there are no safeguards against a user being allowed to execute HTML or JavaScript in the user's browser that can hijack sessions. 1 point Insufficient logging and monitoring Security misconfiguration...
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the...
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the customer buying the end product Direct billing by the firm for IS resources or services to the department that uses them Direct billing by the manager of a function for IS resources or services to an employee that uses them An accounting process that reduces tax liability for capital investments All of the following are attributes of considering IS costs as Overhead except the...