What part of the CIA triad was compromised by the faulty Windows update?
Availability
What type of virus is able to change its code and adapt to different conditions?
Polymorphic Virus
What is the commonly used file system of Windows?
NTFS (New Technology File System)
What protocol turns HTTP into HTTPS?
SSL (Secure Socket Layer) or TLS (Transport Layer Security)
Telnet
What security practice prevents dumpster diving?
Document Shredding
What attack disrupts availability by overloading systems?
Denial of Service (DoS)
Recording logon attempts, system events, and file access is called what?
Auditing
What are logical segmentations of an internal network?
VLANs
What is the volatile form of storage within your browser called?
IDS (Intrusion Defense System) is what kind of security control?
Technical
Logic Bomb
What is an administrative security feature in Windows that controls authorization within the operating system?
User Access Control (UAC)
What is the first step in dealing with an infected system?
Quarantine
What is it called when a malicious data packet moves past firewall security with no alert?
False Negative
Type of backup that captures all changed data since the last backup
Incremental Backup
What attack uses "<script>" within a website?
What is a commonly used disk encryption program?
Bitlocker
What is the main security feature of VPNs other than encryption?
Tunneling/Encapsulation
What attack redirects users to illegitimate websites to harvest credentials?
Pharming
What is the security concept that all parties involved cannot deny the authenticity of their participation?
Non-Repudiation
What kind of spyware records the computer input of victims?
Keyloggers
What authentication protocol allows for authentication over an unsecure network?
Kerberos
What kind of firewall thoroughly examines the data in packets to assess malicious activity?
What stores user-specific data on a web page session?
Cookies