You are on page 1of 1

Term Definition

1.Vulnerability d. A flaw or weakness in a program


2.Exploit s. Software code that can be used to take advantage of a
flaw and compromise a system
3.Authentication b. Verification of claimed identity
4.Authorization m. Restricting the actions that a user is permitted to
perform
5.Demilitarized zone f. A subnetwork that is accessible from the Internet but
(DMZ) separate from the organization's internal network
7.Router o. A device that uses the Internet Protocol (IP) to send
packets across networks
8.Social engineering j. An attack that involves deception to obtain access
9.Firewall k. A device that provides perimeter security by filtering
packets
14.Change control and q. A plan to ensure that modifications to an information
change management system do not reduce its security
20.Cloud computing i. An arrangement whereby a user remotely accesses
software, hardware, or other resources via a browser
8.1. Match the following terms with their definitions:

You might also like