Home > Articles

This chapter is from the book

Define Key Terms

Define the following key terms from this chapter, and check your answers in the glossary:

threat hunting

threat feeds

intelligence fusion

security advisories

Common Vulnerability and Exposures (CVE)

false positives

false negatives

true positive

true negative

application scanners

web application scanners

network and port scanners

review logs

configuration reviews

intrusive

nonintrusive

CVSS

base group

temporal group

environmental group

Security Information and Event Management (SIEM)

security monitoring

log collector

data input

Log aggregation

IPFIX

packet captures

user behavior analysis

sentiment analysis

Security Orchestration, Automation, and Response (SOAR)

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.