Infects the computer when the code is accessed and executed, but cannot spread on its own
Virus
The most basic form of firewall that is rule based.
Stateless
A protocol that is used for file transfers that uses SSH for security
FTP (SFTP)
The quarantine environment on a system used to separate harmful malware from the device
sandbox
A simpler form of encryption where the sender and receiver both have the same key
Symmetric
A form of self-spreading malware that exploits system and application vulnerabilities to move between systems.
Worm
Specifically designed to filter HTTP and HTTPS traffic
Web application firewall (WAF)
The port used by the protocol that helps manage and control objects in a domain
The use of signs is considered a _________ security protocol
Deterrent
A Digital Signature provides proof of sender and is encrypted by sender's _________ key
Public
It collects information about the user's activities without the user’s consent
Keylogger
Public-facing network populated by devices such as Web, email, and Proxy Servers
DMZ (Screened Subnet)
A protocol used to facilitate web traffic
HTTP
A attack which seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit
Waterhole Attack
Hiding secret data within an ordinary, non-secret, file or message in order to avoid detection
Steganography
Malicious software that is activated by a pre-determined trigger
Logic Bomb
Cisco proprietary AAA server
TACACS+ Terminal Access Controller Access-Control System
RADIUS ports numbers
1812 and 1813
The IPSec component that is used to facilitate in-network traffic and guarantee data origin
Authentication Header
The IEEE standard for wireless network security which uses the AES(CCMP) block cipher
WPA2
Malware that encrypts files on a computer with a demand for payment in exchange for the key
Ransomware
A device that can cache and filter traffic while acting as an anonymizer for in-network devices
Forward Proxy Server
An encrypting protocol used secure file transfers and remote access
SSH
The official designation for maintaining ALL communications associated with an incident when directed
Legal Hold
A field within HTTP traffic that provides additional content and metadata about the sender for added security
HTTP Header