SYO-601 EXAM WITH COMPLETE SOLUTIONS 100%
CORRECT LATEST UPDATE
Faraday Cage - ANSWER an electrically conductive wire mesh or other conductor
woven into a cage that surrounds a room and prevents electromagnetic signals from
entering or leaving the room through the walls
Fire Suppression - ANSWER the act of stopping a fire and preventing it from spreading
federation - ANSWER a collection of computer networks that agree on standards of
operation such as security standards
Firewall - ANSWER A combination of hardware and/or software filters that stand
between trusted and untrusted networks to protect the trusted network from attack by
hackers who could gain access via public networks - including the internet.
Forensics - ANSWER In terms of security, the act of looking at all of the data at your
disposal to attempt to find out who gained unauthorized access an the extent of that
access.
full backup - ANSWER a backup that copies all data to the archive medium
fuzzing - ANSWER a method of testing whereby invalid input is intentionally fed in to see
if the application can handle it.
GSM - ANSWER Global System for Mobile Communications, commonly known as 2G
hardening - ANSWER the process of making a server of application resistant to an
attack
,HIDS - ANSWER Host-based Intrusion Detection System
HIPS - ANSWER Host Based Intrusion Prevention System
host-based intrusion detection system (HIDS) - ANSWER A software-based application
that runs on a local host computer that can detect an attack as it occurs.
hoax - ANSWER typically, and email message warning of something that isn't true, such
as an outbreak of a new virus. A hoax can send users into a panic and cause more harm
than the virus.
Host-based intrusion prevention system (HIPS) - ANSWER a Host-based system or a
program used to offer protection to the critical computer systems holding critical data
against viruses and other Internet malware.
honeynet - ANSWER A phony system devised to distract attackers from your real
systems.
honeypot - ANSWER An imitation system created for diverting the attackers from your
real system. It is often replete with logging and tracking to gather evidence.
hot aisles - ANSWER A server room aisle that takes away hot air.
hot site - ANSWER A site that can deliver operations in hours after a failure.
Hardware Security Module (HSM) - ANSWER software or appliance stand- alone that
increases security and usually employed with PKI systems
HSM - ANSWER Hardware Security Module
, hybrid cloud - ANSWER Any cloud delivery model composed of two or more of the other
delivery model types.
hypervisor - ANSWER The software that enables virtual machines to exist.
impersonation - ANSWER To pretend to be another person in an attempt to gain
information.
Implicit Deny - ANSWER A condition stating unless otherwise given, the permission will
be denied.
Information Categorization - ANSWER The process of deciding what information can be
made available, to whom, and how.
Information Security management system (ISMS) - ANSWER this is a generic term for a
wide range of systems that manage information security
ISMS - ANSWER Information Security Management System
Infrastructure as a Service-IaaS ANSWER the delivery of computer hardware capability,
including the use of servers, networking, and storage, as a service
IaaS- ANSWER Infrastructure as a Service
infrastructure as code-IaC ANSWER the process of managing and provisioning
computer data centers through machine-readable definition files
integer overflow-ANSWER Putting too much information into too small of a space that
has been set aside for numbers.
CORRECT LATEST UPDATE
Faraday Cage - ANSWER an electrically conductive wire mesh or other conductor
woven into a cage that surrounds a room and prevents electromagnetic signals from
entering or leaving the room through the walls
Fire Suppression - ANSWER the act of stopping a fire and preventing it from spreading
federation - ANSWER a collection of computer networks that agree on standards of
operation such as security standards
Firewall - ANSWER A combination of hardware and/or software filters that stand
between trusted and untrusted networks to protect the trusted network from attack by
hackers who could gain access via public networks - including the internet.
Forensics - ANSWER In terms of security, the act of looking at all of the data at your
disposal to attempt to find out who gained unauthorized access an the extent of that
access.
full backup - ANSWER a backup that copies all data to the archive medium
fuzzing - ANSWER a method of testing whereby invalid input is intentionally fed in to see
if the application can handle it.
GSM - ANSWER Global System for Mobile Communications, commonly known as 2G
hardening - ANSWER the process of making a server of application resistant to an
attack
,HIDS - ANSWER Host-based Intrusion Detection System
HIPS - ANSWER Host Based Intrusion Prevention System
host-based intrusion detection system (HIDS) - ANSWER A software-based application
that runs on a local host computer that can detect an attack as it occurs.
hoax - ANSWER typically, and email message warning of something that isn't true, such
as an outbreak of a new virus. A hoax can send users into a panic and cause more harm
than the virus.
Host-based intrusion prevention system (HIPS) - ANSWER a Host-based system or a
program used to offer protection to the critical computer systems holding critical data
against viruses and other Internet malware.
honeynet - ANSWER A phony system devised to distract attackers from your real
systems.
honeypot - ANSWER An imitation system created for diverting the attackers from your
real system. It is often replete with logging and tracking to gather evidence.
hot aisles - ANSWER A server room aisle that takes away hot air.
hot site - ANSWER A site that can deliver operations in hours after a failure.
Hardware Security Module (HSM) - ANSWER software or appliance stand- alone that
increases security and usually employed with PKI systems
HSM - ANSWER Hardware Security Module
, hybrid cloud - ANSWER Any cloud delivery model composed of two or more of the other
delivery model types.
hypervisor - ANSWER The software that enables virtual machines to exist.
impersonation - ANSWER To pretend to be another person in an attempt to gain
information.
Implicit Deny - ANSWER A condition stating unless otherwise given, the permission will
be denied.
Information Categorization - ANSWER The process of deciding what information can be
made available, to whom, and how.
Information Security management system (ISMS) - ANSWER this is a generic term for a
wide range of systems that manage information security
ISMS - ANSWER Information Security Management System
Infrastructure as a Service-IaaS ANSWER the delivery of computer hardware capability,
including the use of servers, networking, and storage, as a service
IaaS- ANSWER Infrastructure as a Service
infrastructure as code-IaC ANSWER the process of managing and provisioning
computer data centers through machine-readable definition files
integer overflow-ANSWER Putting too much information into too small of a space that
has been set aside for numbers.