Professional Documents
Culture Documents
Pregunta 12 ptos.
What is an example of early warning systems that can be used to thwart
cybercriminals?
hacktivists
trusted partners
black hat hackers
ex-employees
amateurs
script kiddies
white hat hackers
black hat hackers
gray hat hackers
SAN
NAC
NAS
VPN
purged data
data encrypted
data in-process
data in-transit
stored data
data decrypted
data in-process
data in-transit
encrypted data
stored data
identity management
hashing
RAID
encryption
phishing
spam
worm
virus
familiarity
trusted partners
urgency
intimidation
ransomeware
Trojan horse
man-in-the-middle attack
DoS attack
data obfuscation
most significant bit
data masking
least significant bit
key management
key length
encryption algorithm
reverse engineering
access
authorization
identification
authentication
compensative
detective
corrective
preventive
ECC
Diffie-Hellman
RSA
3DES
logical
physical
administrative
technological
administrative
physical
logical
technological
hashing operations
digital certificates
data validation rules
VPNs and encryption services
salting
SHA-256
HMAC
CRC
AES
MD5
rainbow tables
HMAC
a limitation rule which has been implemented to prevent unauthorized staff from entering sensitive data
a validation rule which has been implemented to ensure completeness, accuracy, and consistency of
data
data entry controls which only allow entry staff to view current data
data encryption operations that prevent any unauthorized users from accessing sensitive data
digital certificate
asymmetric encryption
HMAC
digital signature
qualitative analysis
loss analysis
quantitative analysis
protection analysis
detective
corrective
management
preventive
layering
limiting
obscurity
diversity
Infragard
CVE national database
ISO/IEC 27000 model
NIST/NICE framework
frequency factor
quantitative loss value
exposure factor
asset value
single loss expectancy
annual rate of occurrence
qualitative analysis
loss analysis
quantitative analysis
exposure factor analysis
WPA2
WPA
WEP
WEP2
TKIP
802.11q
WPA
WPA2
802.11i
WEP
ping
NTP
DNS
RIP
SCP
SSH
WPA
Telnet
ARP
SSH
strong authentication
encrypted voice messages
CERT
Internet Storm Center
The Advanced Cyber Security Center
The National Vulnerability Database website
device-related threats
user-related threats
physical threats
cloud-related threats
device
physical facilities
network
user