Home > Articles

This chapter is from the book

Define Key Terms

Define the following key terms from this chapter and check your answers in the glossary:

tactics, techniques, and procedures (TTPs)

malware

virus

worm

Trojan

ransomware

advanced persistent threat (APT)

distributed denial-of-service (DDoS)

synchronization (SYN) flood

User Datagram Protocol (UDP) flood

Hypertext Transfer Protocol (HTTP) flood

man-in-the-middle (MITM) attack

side-channel attack

intrusion detection system (IDS)

network intrusion detection system (NIDS)

host-based intrusion detection system (HIDS)

intrusion prevention system (IPS)

firewall

packet filtering firewall

proxy, application-aware firewall

web-application filtering firewall (WAF)

next-generation firewall (NGFW)

scanning

penetration test

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.