Infects the computer when the code executed, but cannot spread on its own
Virus
The most basic form of firewall that is rule based.
Stateless
A protocol, used for file transfers, that uses SSH for security
FTP (SFTP)
The quarantine environment on a system used to separate harmful malware from the device
sandbox
A simpler form of encryption where the sender and receiver both have the same key
Symmetric
A form of self-spreading malware that exploits system and application vulnerabilities to move between systems.
Worm
Specifically designed to filter HTTP and HTTPS traffic
Web application firewall (WAF)
A protocol used to facilitate web traffic
HTTP
The use of signs is considered a _________ security protocol
Deterrent
A Digital Signature provides proof of origin and is encrypted by sender's _________ key
Private
It collects information about the user's activities without the user’s consent
Keylogger
Public-facing network populated by devices such as Web, Email, and Proxy Servers
DMZ (Screened Subnet)
The port used by the protocol that helps manage and control objects in a domain
A attack which seeks to compromise a specific group of end users by targeting websites or locations that members of the group are known to visit
Waterhole Attack
Hiding secret data within an ordinary, non-secret file or message in order to avoid detection
Steganography
Malicious software that is activated by a pre-determined trigger
Logic Bomb
Cisco proprietary AAA server
TACACS+ Terminal Access Controller Access-Control System
RADIUS ports numbers
1812 and 1813
The IPSec component that is used to facilitate in-network traffic and guarantee data origin
Authentication Header
The standard for wireless network security which uses the CCMP (AES) block cipher
WPA2
Malware that encrypts files on a computer with a demand for payment in exchange for the key
Ransomware
A device that can cache and filter traffic while acting as an anonymizer for in-network devices
Forward Proxy Server
An encrypting protocol used secure remote access
SSH
The official designation for maintaining ALL communications associated with an incident when directed
Legal Hold
A field within HTTP traffic that provides additional content and metadata about the sender for added security
HTTP Header