To allow a connection through a firewall.
What is an exception?
This device is designed to forward data packets between networks.
What is a Router?
This network or host-based monitoring system is designed to automatically alert administration of known or suspected unauthorized activity. (IDS)
Intrusion Detection Systems
This is performed in the time-boxed or small increments to allow more adaptivity to change.
What is Agile Software Development?
This code is placed in computer programs to bypass normal authentication and other security mechanisms. (Poor coding practice not to be utilized)
What are Backdoors?
True or False: Disabling unused ports is considered one of many measures for securing networking devices.
What is True?
This process ensures the privacy of a VPN connection.
What is Tunneling?
This refers to a firewall controlling access to a web server. (WAF)
What is Web Application Firewall?
This is a classic approach to developing a software in a linear and sequential manner.
What is the Waterfall Model?
A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information.
What is Phishing?
This software or hardware checks information coming from the Internet and can be configured to allow or block incoming traffic.
What is a Firewall?
A network device designed for managing the optimal distribution of workloads across multiple computing resources.
What is a Load Balancer?
This refers to a network security solution combining the functionality of a firewall with additional safeguards such as URL filtering, content inspection, or malware inspection. (UTM)
What is Unified Threat Management?
A methodology with clearly defined processes for creating high-quality software, it is set in stages, activities, and tasks that software projects go through.
What is the Software Development Life Cycle?
A penetration test performed by an authorized professional with the full prior knowledge on how the system that is to be tested works.
What is White-box testing?
In the event of a lost or stolen device, this security measure enables administrators to revert a device to factory settings from afar.
What is Remote Wipe?
A type of private network for a corporation or organization accessible only to its employees or authorized members.
What is Intranet?
This is a network security solution that inspects network traffic in real-time and has the capability to stop the ongoing attack. (NIPS)
What is Network Intrusion Protection System?
This reduces the amount of code used by a program, eliminate unneeded functionality, and require authentication prior to running additional plugins.
What is Hardening/Minimizing Attack Surface?
A computer network service that allows clients to make indirect network connections to other network services.
What is a Proxy?
A software tool that consists of a network adapter that connects to the network and software that logs, displays, or analyzes the data packets that flow between computers.
What is a Packet Sniffer?
A type of IP address what would be assigned to a software-based load balancer to handle an internet site hosted on several web servers, each with its own private IP address.
What is a Virtual IP Address?
This refers to a set of rules that specify which user or system processes are granted access to objects as well as what operations are allowed on a given object. (ACL)
What is Access Control List?
Conducting business where the software developers and the IT operations Personnel work closely together to speed up development and deployment.
What is DevOPs?
The act of locating and mapping wireless networks while moving around in a vehicle.
What is War Driving?