An implementation technique to control access to a resource by maintaining a table of authorized user IDs is called ___.
ACCESS CONTROL LIST (ACL)
Software or plug-ins that run within a client browser, usually when visiting certain Web sites is called ___.
ACTIVE CONTENT
The act of recording relevant security events that occur on a computing or network device (server, workstation, firewall, etc.) This can also refer to a review of business and financial processes and files by an auditor is called ___.
AUDIT
The process of removing unnecessary software on a server or workstation, turning off unneeded network ports and services, and preventing users from changing a machine’s configuration is called ___.
HOST HARDENING
A series of software agents, appliances, and servers that monitor for network activity that is deemed a threat, alerts, administrators, and logs the information. They operate by matching signatures of known poodle network attack traffic or by building over time a baseline of normal behavior then alerting on traffic that is anomalous to that normal pattern of behavior and is called ___.
INTRUSION DETECTION SYSTEM (IDS)
A system that intercepts potentially hostile activity prior to it being process is called ___.
INTRUSION PREVENTION SYSTEM (IPS)
An application firewall that is used to control the flow of traffic to and from the Internet to user workstations attached to a local area network. It intercepts the user’s request for an Internet resource, initiates a new connection, and proxies the result back to the requestor and is called ___.
USER PROXY
Automated information services over the Internet using standardized technologies and formats/protocols that simplify the exchange and integration of data. This helps organizations to inter-operate regardless of the types of operating systems, programming languages, and databases being used and is called ___.
WEB SERVICES
Procedure
Internet network
Physical security
Routers and firewalls
Malware on the network
Lawsuits from software licensing issues
Loss of productivity
US Government
Private companies selling standards
Professional organizations
Vendors
LAN
Baseline standard
LAN-to-WAN
Cohesive
Coherent
TRUE
FALSE