A broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). LAN is an abbreviation of local area network.
What is VLAN
100
a test result which incorrectly indicates that a particular condition or attribute is present
What is a false positive
100
a form of malware (malicious software), usually that which presents unwanted advertisements to the user of a computer
What is Adaware
100
a software testing technique, often automated or semi-automated, that involves providing invalid, unexpected, or random data to the inputs of a computer program
What is Fuzzing
100
the art of writing or solving codes
What is Cryptography
200
a perimeter network that is a physical or logical sub network that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet.
What is a DMZ
200
What is ALE
What is Annual Loss Expectency
200
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
What is Spyware
200
is a type of computer security vulnerability typically found in web applications, enables attackers to inject client-side scripts into web pages viewed by other users
What is Cross Site Scripting (XSS)
200
is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than to one bit at a time
What is Block Cipher
300
helps organizations to prevent computer users from viewing inappropriate web sites or content, or to prevent access of known malware hosts
What is URL Filtering
300
What is ARO?
What is Annual Rate of Occurance
300
a type of denial of service attack in which a system is flooded with spoofed ping messages
What is a Smurf Attack
300
also called a message digest, is a number generated from a string of text
What is a Hash
400
an Internet standard that enables a local-area network (LAN) to use one set of IP addresses for internal traffic and a second set of addresses for external traffic
What is NAT
400
the controlled identification and implementation of required changes within a computer system
What is Change Management
400
the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers
What is Pharming
400
a data governance process that details an organization's legal ownership of enterprise-wide data
What is Data Ownership
400
the act or profession of splitting a computer network into subnetworks
What is Network Segmentation
500
hardware or software that assists in prevenditng DOS/DDOS attacks generated through packet flooding
What is a flood guard
500
is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so
What is a Data Breach
500
is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address
What is DNS Poisoning
500
the process of converting information or data into a code, especially to prevent unauthorized access
What is encryption
500
the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms