Match each item with a statement below.

A. Persistent spyware
B. Unwanted e-mail traffic
C. Risks often outweigh benefits with this strategy
D. Permitting only a certain number of packets per second to use a specific protocol
E. Using social engineering techniques to impersonate another person
F. Used to deter UA attacks
G. Downloading computer games on company machines without permission
H. A program used to integrate policies into an organization
I. Reestablishment of pre-incident status


A. Tracking cookie
B. Spam
C. Delayed containment
D. Rate limiting
E. Unauthorized access
F. Effective password policy
G. Inappropriate use
H. SETA
I. Incident recovery

Trades & Technology

You might also like to view...

A very common method of detecting motor speed is with the use of a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Trades & Technology

On its label, an herbicide has three names, including the ____________________ name, the ____________________ name, and the ____________________ name

Fill in the blank(s) with correct word

Trades & Technology

The purpose of an evaporator in the refrigeration cycle is to _____

A) make sure no liquid gets into the compressor B) absorb heat from the air or water C) transfer heat to the outdoors D) provide a pressure drop that lowers the boiling point of the refrigerant

Trades & Technology

An SCR can be turned on or off by a short burst of current into the gate when used in a DC circuit.

Answer the following statement true (T) or false (F)

Trades & Technology