Data that can identify or locate an individual is classified as __________.
PII
An access control vestibule is an example of ______ Security.
Physical
The pattern .../.../.../ is indicative of this kind of attack.
Directory Traversal
A __________ uses an access control list to allow or deny network access.
Firewall
The method used by hackers to get people to provide them with confidential information is generally called __________ Engineering.
Social
___________ is the US law governing all health-related information of an individual.
HIPAA
Hot
________ ________ is a hardware specific vulnerability.
Firmware version
This form of network hardening involves dividing the network into lots of smaller sections, requiring the hacker to break through more "walls" to compromise the entire network.
Segmentation
When a company pays hackers to find a vulnerability in their network, it is called a _______ _________.
Bug Bounty
_____________ is a class of software and hardware that prevent restricted data from leaving a network.
DLP
_________ is the name of the process involving securely wiping decommissioned devices.
Sanitization
Being able to execute code on an app sign-up page indicates a failure of ________ ________.
Input Validation
This system collects and analyzes logs from multiple sources, and presents the results in centralized dashboard.
SIEM
An attack that uses email as the attack vector is called _________.
Phishing
The law governing the private data of European citizens is called __________.
GDPR
The authenticity of a web site is guaranteed by its _______ ________.
Digital Certificate
Researching the potential threats to a network without actually interacting with the network is called ________ _________.
Threat Hunting
A firewall would be considered this kind of security control type.
Technical
The defenders in an offensive and defensive security exercise are called the _________ _________.
Blue Team
The law governing the handing of credit card and debit card data is called ___________.
PCI DSS
A _________ _________ categorizes and prioritizes risks in a central, easy to read format.
Risk Register
_______ _________ involves injecting commands that are always true in order to gain access to database information.
SQL Injection
Internet-facing devices should be placed in a secure area of the network known as a _________ __________.
Screened Subnet
An attacker that maintains a presence in the victim's network over time, without being detected is an __________ ___________ Threat
Advanced Persistent (Threat)