Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Security + Guide Quiz

Select the Definition that corresponds to the displayed Term.
incorrect
1. cybercriminals




incorrect
2. hoax




incorrect
3. backout/contingency option




incorrect
4. evil twin




incorrect
5. locking cabinet




incorrect
6. ping




incorrect
7. hot site




incorrect
8. stegnography




incorrect
9. router




incorrect
10. elliptic curve cryptography (ECC)




Select the Term that corresponds to the displayed Definition.
incorrect
11. a process in which keys are managed by a third-party, such as a trusted CA called the root




incorrect
12. a monitoring technique used by an IDS that uses the normal processes and actions as the standard and compares actions against it




incorrect
13. an item that has value




incorrect
14. a separate network that rests outside the secure network perimeter; untrusted outside users can access the DMZ but cannot enter the secure network




incorrect
15. a technique to recover a private key by distributing parts to different individuals




incorrect
16. a set of software tools used by an attacker to hide the actions or presence of other types of malicious software




incorrect
17. a test where some limited information has been provided to the tester




incorrect
18. the second version of the Terminal Access Control Access Control System (TACACS) authentication service




incorrect
19. a hash algorithm that uses two different and independent parallel chains of computation and then combines the result at the end of the process




incorrect
20. a control that errs on the side of security in the event of a failure





Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Popular Computers sets