Malware
Network components
Protocols
Security Misc
Cryptography
100

Infects the computer when the code is accessed and executed, but cannot spread on its own

Virus

100

The most basic form of firewall that is rule based.

Stateless

100

A protocol that is used for file transfers that uses SSH for security

FTP (SFTP) 

100

The quarantine environment on a system used to separate harmful malware from the device

sandbox

100

A simpler form of encryption where the sender and receiver both have the same key

Symmetric

200

A form of self-spreading malware that exploits system and application vulnerabilities to move between systems.

Worm

200

Specifically designed to filter HTTP and HTTPS traffic

Web application firewall (WAF)

200

The port used by the protocol that helps manage and control objects in a domain

389 (LDAP)
200

The use of signs is considered a _________ security protocol

Deterrent

200

A Digital Signature provides proof of sender and is encrypted by sender's _________ key

Public

300

It collects information about the user's activities without the user’s consent

Keylogger

300

Public-facing network populated by devices such as Web, email, and Proxy Servers

DMZ (Screened Subnet)

300

A protocol used to facilitate web traffic

HTTP

300

A attack which seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit

Waterhole Attack

300

Hiding secret data within an ordinary, non-secret, file or message in order to avoid detection

Steganography

400

Malicious software that is activated by a pre-determined trigger

Logic Bomb

400

Cisco proprietary AAA server

TACACS+ Terminal Access Controller Access-Control System 

400

RADIUS ports numbers

1812 and 1813

400

The IPSec component that is used to facilitate in-network traffic and guarantee data origin

Authentication Header

400

The IEEE standard for wireless network security which uses the AES(CCMP) block cipher

WPA2

500

Malware that encrypts files on a computer with a demand for payment in exchange for the key

Ransomware

500

A device that can cache and filter traffic while acting as an anonymizer for in-network devices

Forward Proxy Server

500

An encrypting protocol used secure file transfers and remote access

SSH

500

The official designation for maintaining ALL communications associated with an incident when directed

Legal Hold

500

A field within HTTP traffic that provides additional content and metadata about the sender for added security

HTTP Header

M
e
n
u