OPS Flashcards

1
Q

Microphones, vibrations sensors

A

Acoustical Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Relevant, sufficient, reliable, does not have to be tangible

A

Admissible Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks

A

Alarm filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A signal suggesting a system has been or is being attacked.

A

Alert/Alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.

A

Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When resolving a single failure (though system administrators are needed to resolve additional failures

A

Automatic Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Higher level of recovery defining prevention against the undue loss of protected objects

A

Automatic Recovery Without Undo Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Alarm to local fire or police

A

Auxiliary Station Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tape: sequential, slow read, fast write 200GB an hour, historically
cheaper than disk (now changing), robotic libraries
Disk: fast read/write, less robust than tape
Optical drive: CD/DVD. Inexpensive
Solid state: USB drive, security issues, protected by AES

A

Backup Storage Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Primary: used at the trial because it is the most reliable.
Original documents are used to document things such as contracts

A

Best Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Placeholders for literal values in SQL query being sent to the database on a server; Used to enhance performance of a database

A

Bind Variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Focus on illegally obtaining an organization’s confidential information. The use of the information gathered usually causes more damage than the initial event itself.

A

Business Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Less than 10mins travel time for e.g. an private security firm

A

Central Stations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Collection, analysis and preservation of data
Forensics uses bit-level copy of the disk

A

Chain of Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Maintaining full control over requests, implementation, traceability, and proper documentation of changes.

A

Change Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Electrical

A

Cipher Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Used to help assume another fact
Cannot stand on its own to directly prove a fact

A

Circumstantial Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Europe, South America

A

Civil Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.

A

Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

organization way of classifying data by factors such as criticality, sensitivity and ownership.

A

Classification Scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Overwriting media to be reused

A

Clearing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

3 digits with wheels

A

Combination Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

USA, UK Australia Canada (judges)

A

Common Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

3 types of harm:

unauthorized intrusion

unauthorized alteration or destruction

malicious code

A

Computer Crime Laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Irrefutable, cannot be contradicted
Requires no other corroboration

A

Conclusive Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack

A

Confidence value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Collection of component CI’s that make another CI

A

Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

 Component whose state is recorded

A

Configuration item (CI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Mitigate damage by isolating compromised systems from the network.

A

Containment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Supports or substantiates other evidence presented in a case

A

Corroborative Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Unused network space that may detect unauthorized activity

A

Darknet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Individuals and departments responsible for the storage and safeguarding of computerized data.

A

Data Custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A database that contains the name, type, range of values, source and authorization for access for each data element

A

Data Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Is a country or location that has no laws or poorly enforced laws

A

Data Haven

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The property that data meet with a priority expectation of quality and that the data can be relied upon.

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.

A

Data Leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Systems attempt to detect and block exfiltration attempts. These systems have the capability of scanning for keywords and patterns.

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Individuals, normally managers or directors, who have responsibility for the integrity, accurate reporting and use of computerized data.

A

Data Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Real-time data backup ( Data Mirroring)

A

Database Shadowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

External communications

A

Debriefing / Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).

A

Degauss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Identification and notification of an unauthorized and/or undesired action

A

Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Bolt down hardware

A

Device Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Only modified files, doesn’t clear archive bit. Advantage: full and only last one needed, Intermediate time between.

A

Differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Can prove fact by itself and does not need any type of backup.
Testimony from a witness; one of their 5 senses.
Oral: case can’t stand on it alone
Oral: does not need other evidence to substantiate

A

Direct Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Senses a break or change in a circuit magnets pulled lose, wires door, pressure pads

A

Electromechanical Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Periodic, automatic and transparent backup of data in bulk.

A

Electronic Vaulting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Occurs after a failure happens in an uncontrolled manner. E.g. when a low privileged user tries to access restricted memory segments

A

Emergency Restart Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Can scan files stored on a system as well as files sent to external devices, such as printers. For example, an organization ? can prevent users from copying sensitive data to USB flash drives or sending sensitive data to a printer.

A

Endpoint-based DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The legal action of luring an intruder, like in a honeypot

A

Enticement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Refers to the amount of privileges granted to users, typically when first provisioning an account. A user audit can detect when employees have excessive privileges

A

Entitlement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The illegal act of inducing a crime; the individual had no intent of committing the crime at first

A

Entrapment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Malicious act of gathering proprietary, secret, private, sensitive, or confidential information about an organization.

A

Espionage

Often with the intent of disclosing or selling the information to a competitor or other interested organization (such as a foreign government). Attackers can be dissatisfied employees, and in some cases, employees who are being blackmailed from someone outside the organization. Countermeasures are to strictly control access to all nonpublic data, thoroughly screen new employee candidates, and efficiently track all employee activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Must be preserved and identifiable

A

Evidence

Sufficient –persuasive enough to convince one of its validity
Reliable –consistent with fact, evidence has not been tampered with or modified
Relevant –relationship to the findings must be reasonable and sensible, Proof of crime, documentation of events, proof of acts and methods used, motive proof, identification of acts
Permissible – lawful obtaining of evidence, avoid: unlawful search and seizure, secret recording, privacy violations, forced confessions, unlawful obtaining of evidence
Preserved and identifiable – collection, reconstruction
Identification labeling, recording serial number etc.
Evidence must be preserved and identifiable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

1. Discovery
2. Protection
3. Recording
4. Collection and identification
5. Analysis
6. Storage, preservation, transportation
7. Present in court
8. Return to owner

A

Evidence Lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Allows officials to seize evidence before it’s destroyed (police team fall in)

A

Exigent Circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

 Most conservative from a security perspective

A

Fail Closed/Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Program execution is terminated and system protected from hardware or software compromise occurs DOORS usually

A

Fail safe system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Or resilient system: reboot, selected, non-critical processing is terminated

A

Fail soft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

 Switches to hot backup

A

Failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Backup critical information thus enabling data recovery

A

Failure Preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

The event signaling an IDS to produce an alarm when no attack has taken place

A

False attack stimulus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A failure of an IDS to detect an actual attack

A

False negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

An alert or alarm that is triggered when no actual attack has taken place

A

False positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Mitigation of system or component loss or interruption through use of backup capability.

A

Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Carried out to unlawfully obtain money or services.

A

Financial Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

All files, archive bit and modify bit are cleared. Advantage: only previous day needed for full restore, disadvantage: time consuming

A

Full Backup

68
Q

System can restore functional processes automatically

A

Function Recovery

69
Q

Carried out to damage an organization or a person. The damage could be in the loss of information or information processing capabilities or harm to the organization or a person’s reputation.

A

Grudge Attacks

70
Q

 Want to verify their skills as intruders

A

Hackers and Crackers

71
Q

Often combine political motivations with the thrill of hacking.

A

Hacktivists

72
Q

Review the contents. This may include a review of Personal computers & Smartphones

A

Hardware/ Embedded Device Analysis

73
Q

 Second-hand data not admissible in court

A

Hearsay

74
Q

Something a witness hears another one say.

Business records and all that’s printed or displayed. Exception: audit trails and business records when the documents are created in the normal course of business.

A

Hearsay Evidence

75
Q

Information that, if made public or even shared around the organization, could seriously impede the organization’s operations

A

Highly Confidential

76
Q

Monitors activity on a single computer, including process calls and information recorded in firewall logs. Often examines events in more detail than NIDS, can pinpoint specific files compromised in an attack. Can track processes employed by the attacker. A benefit over NIDSs is that it can detect anomalies on the host system.

A

Host-based IDS (HIDS)

77
Q

Redundant component that provides failover capability in the event of failure or interruption of a primary component.

A

Hot Spares

78
Q

Software component that manages the virtual components. Adds an additional attack surface, so it’s important to ensure it is deployed in a secure state and kept up-to-date with patches, controls access to physical resources

A

Hypervisor

79
Q

Event or series of events that adversely impact the ability of an organization to do business; suspected attack

A

Incident

80
Q

A documented battle plan for coordinating response to incidents.

A

Incident handling

81
Q

Incident response process

A

Detect
Respond
Report
Recover
Remediate
Review

82
Q

Only modified files, archive bit cleared, Advantage: least time and space, Disadvantage: first restore full then all incremental backups, thus less reliable because it depends on more components

A

Incremental Backup

83
Q

loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.

A

Internal Use only

84
Q

Evidence retrieval method, ultimately obtain a confession

A

Interrogation

85
Q

 Gather facts and determine the substance of the case.

A

Interviewing

86
Q

Occurs when an attacker is able to bypass or thwart security mechanisms and gain access to an organization’s resources.

A

Intrusion

87
Q

Monitors recorded information and real-time events to detect abnormal activity indicating a potential incident. Automates the inspection of logs and real-time events to find attempts and failures. An effective method of detecting many DoS and DDoS attacks. Can recognize attacks that come from external connections, such as from the Internet, and attacks that spread internally such as a malicious worm. Responds by sending alerts or raising alarms. In some cases can modify the environment to stop an attack.

A primary goal is to provide a means for a timely and accurate response to attacks. Intended as part of a defense-in-depth security plan. It will work with and compliment other security mechanisms but does not replace them.

A

Intrusion Detection System (IDS)

88
Q

Includes all the capabilities of an IDS but can also take additional steps to stop or prevent intrusions. If desired, administrators can disable these extra features, essentially causing it to function as an IDS.

A

Intrusion Prevention System (IPS)

89
Q

 ME, Africa, Indonesia

A

Islamite and other Religious Laws

90
Q

Most basic type of storage
When two drives or disks have a logical joining without redundacy

A

JBOD

91
Q

Evenly distributed

A

Lighting Continuous

92
Q

No bleeding over no blinding

A

Lighting Controlled

93
Q

 Against blinding

A

Lighting Glare Protection

94
Q

IDS detects activities and turns on lightning

A

Lighting Responsive Areas Illumination

95
Q

Timers

A

Lighting Standby

96
Q

If no tampering is done with the alarm wires

A

Line Supervision Check

97
Q

Audible at least 4000 feet

A

Local Alarms

98
Q

every time you make contact with another it results in an exchange of materials for both physical and digital evidence.

A

Locard’s principle

99
Q

Record of system activity, which provides for monitoring and detection.

A

Log

100
Q

 System administrator intervention is required to return the system to a secure state

A

Manual Recovery

101
Q

A branch of computer forensic analysis. Involves the identification and extraction of information from storage. This may include the following: Magnetic (e.g., hard disks, tapes) Optical (e.g., CDs, DVDs, Blu-ray discs) Memory (e.g., RAM, solid state storage)

Techniques used may include the recovery of deleted files from unallocated sectors of the physical disk, the live connection to a computer system (especially useful when examining encrypted), and the static examination of forensic images of storage.

A

Media Analysis

102
Q

Designed to extract secret information.

A

Military or Intelligence Attack

103
Q

MOM

A

Means, Opportunity and Motive
Used in determining suspects

104
Q

Continuous surveillance, to provide for detection and response of any failure in preventive controls.

A

Monitor

105
Q

wave pattern movement sensors

A

Motion Detector

106
Q

MTBF

A

Mean Time Between Failures (Useful Life) = MTTF + MTTR
Mean Time To Failure
Mean Time To Recover

107
Q

Often depends on either prior knowledge that an incident is underway or the use of preexisting security controls that log activity. These include: Intrusion detection and prevention system logs, data captured by a flow monitoring system, Packet captures deliberately collected during an incident. Logs from firewalls and other security devices. Collect and correlate information from these disparate sources and produce as comprehensive a picture of activity as possible.

A

Network Analysis

108
Q

Server optimized for providing file-based data storage to the network. Unlike a File Server, a ? unit has no input or output devices, and the OS is dedicated for providing storage services.

A

Network Attached Storage (NAS)

109
Q

Scans all outgoing looking for specific variables. If a user sends out a restricted file, the system will detect it and prevent it from leaving the organization. Sends an alert, such as an email to an administrator.

A

Network-based DLP

110
Q

Monitors and evaluates network activity to detect attacks or event anomalies. Cannot monitor content of encrypted traffic but can monitor other packet details. Just one can monitor a large network by using remote sensors to collect data at key network locations that send data to a central management console.

A

Network-based IDS (NIDS)

111
Q

Data or interference that can trigger a false positive

A

Noise

112
Q

Most preferred in the legal investigation; pages are attached to a binding.

A

Notebook

113
Q

Communication of a security incident to stakeholders and data owners.

A

Notification

114
Q

Utilization after initial use

A

Object Reuse

115
Q

Requires witnesses to testify only about the facts of the case; cannot be used as evidence in the case.

A

Opinion Rule

116
Q

Involve relocating personnel to the alternate site and commencing operations there. Critical systems are run at an alternate site, main site open also

A

Parallel Tests

117
Q

Through sensing changes in temperature

A

Passive Infrared Detection

118
Q

Light beams interrupted (as in an store entrance)

A

Photoelectric Detector

119
Q

A very cold site.

A

Prefabricated Building

120
Q

Comes with door

A

Preset Lock

121
Q

Controls deployed to avert unauthorized and/or undesired actions.

A

Prevention

122
Q

Combination or electrical lock

A

Programmable Lock

123
Q

Define the way in which the organization operates.

A

Proprietary

124
Q

Owned and operated by the customer.
System provides many of the features in-house

A

Proprietary Systems

125
Q

Customer view taken into account

A

Prototyping

126
Q

Magnetic field shows presence around an object

A

Proximity or Capacitance Detector

127
Q

False vulnerability in a system that may attract an attacker

A

Pseudo Flaw

128
Q

Degaussing or overwriting to be removed

A

Purging

129
Q

RAID Levels

A

RAID 0 Striped, one large disk out of several. Improved performance but no fault tolerance
RAID 1 Mirrored drives: fault tolerance from disk errors and single disk failure, expensive; redundancy only, not speed
RAID 2 not used commercially. Hammering Code Parity/error
RAID 3 Striped on byte level with extra parity drive. Improved performance and fault tolerance, but parity drive is a single point of failure and write intensive. 3 or more drives
RAID 4 Same as Raid 3 but striped on block level; 3 or more drives
RAID 5 Striped on block level, parity distributed over all drives. Requires all drives but one to be present to operate hot. Swappable. Interleave parity, recovery control; 3 or more drives
RAID 6 Dual Parity; parity distributed over all drives. Requires all drives but two to be present to operate hot. Swappable.
RAID 7 Same as raid 5 but all drives act as one single virtual disk

130
Q

Circumvent a pin tumbler lock

A

Raking

131
Q

Measures followed to restore critical functions following a security incident.

A

Recovery

132
Q

A group of hard drives working as one storage unit for the purpose of speed and fault tolerance

A

Redundant Array of Independent Drives (RAID)

133
Q

Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.

A

Redundant Servers

134
Q

Potentially retrievable data residue that remains following intended erasure of data.

A

Remanence

135
Q

Real-time, automatic and transparent backup of data.

A

Remote Journaling

136
Q

Policy, procedures, a team

A

Response Capability

137
Q

Criminal act of destruction or disruption committed against an organization by an employee. It can become a risk if an employee is knowledgeable enough about the assets of an organization, has sufficient access to manipulate critical aspects of the environment, and has become disgruntled.

A

Sabotage

138
Q

Goes back to the primary site to normal processing environmental conditions. Clean, repair, save what can be saved. Can declare when primary site is available again

A

Salvage Team

139
Q

Attackers who lack the ability to devise their own attacks will often download programs that do their work for them. The main motivation behind these attacks is the “high” of successfully breaking into a system. Service interruption. An attacker may destroy data, the main motivation is to compromise a system and perhaps use it to launch an attack against another victim. Website defacements common

A

Script Kiddies

140
Q

Copies of documents. Not as strong as best. A copy is not permitted if the original (Best) is available. Oral like Witness testimony

A

Secondary Evidence

141
Q

Group of independent servers which are managed as a single system. All servers are online and take part in processing service requests.
All share the same OS and application software vs. grid devices that can have different OSs while still working on same problem.

A

Server Clustering

142
Q

Guidelines within an organization that control the rules and configurations of an IDS

A

Site policy

143
Q

The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity

A

Site policy awareness

144
Q

Conduct forensic reviews of applications or the activity that takes place within a running application. In some cases, conduct a review of software code, looking for back doors, logic bombs, or other security vulnerabilities. In other cases, review and interpret the log files from application or database servers, seeking other signs of malicious activity, such as SQL injection attacks, privilege escalations, or other application attacks.

A

Software Analysis

145
Q

Controlled area only accessible for approved users

A

Software Library

146
Q

A subnetwork with storage devices servicing all servers on the attached network.

A

Storage Area Network (SAN)

147
Q

Third party, commercial services provide alternate backups and processing facilities. Most common of implementations!

A

Subscription Services

148
Q

When an unexpected kernel or media failure happens and the regular recovery procedure

A

System Cold Start Failure

149
Q

System shuts itself down in a controlled manner after detecting inconsistent data structures or runs out of resources

A

System Reboot Failure

150
Q

System Recovery

A

1. Rebooting system in single user mode or recovery console, so no user access is enabled
2. Recovering all file systems that were active during failure
3. Restoring missing or damaged files
4. Recovering the required security characteristic, such as file security labels
5. CheckingSystem Recovery

151
Q

Purpose of a ? is to disrupt normal life and instill fear

A

Terrorist Attacks

152
Q

Launched only for the fun of it. Pride, bragging rights

A

Thrill Attacks

153
Q

Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public

A

Top Secret

154
Q

An event that triggers an IDS to produce an alarm and react as though a real attack were in progress

A

True attack stimulus

155
Q

Ensures that the security is not breached when a system crash or failure occurs. Only required for a B3 and A1 level systems.

A

Trusted Recovery

156
Q

Cylinder slot

A

Tumbler Lock

157
Q
  • Operational
  • Criminal
  • Civil
  • eDiscovery
A

Types of Investigation

158
Q

Legislative: writes (statutory laws)
Executive: enforces (administrative laws)
Juridical: interprets laws (makes common laws out of court decisions)

A

US Law: 3 Branches

159
Q

Criminal: individuals in violation; punishment mostly imprisonment
Civil: wrongs against individual or organization that result in a damage or loss. Punishment can include financial penalties. AKA tort (I’ll Sue You!) Jury decides liability
Administrative/Regulatory: – how industries, organizations and officers have to act. Wrongs can be penalized with imprisonment or financial penalties

A

US Law: 3 Categories

160
Q

Why certain people fall prey to crime and how lifestyle affects their chances

A

Victimology

161
Q

Hanging, with a key

A

Warded Lock

162
Q

Raid 6

A

Does not require a hot spare drive or disk

163
Q

piracy act of copying software from top notch brands and distributing over the Internet

A

warez

164
Q

colocation cloud

A

Colocation cloud combines the benefits of colocation and cloud computing to provide a comprehensive solution that addresses the limitations of traditional data management approaches.

165
Q

blue team

A

defends from attacks

166
Q

red team

A

attacks

167
Q

white team

A

handles security incidents