1/12 | |||||||||||||||||||||||||
2/14 | 15 | ||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
3/4 | |||||||||||||||||||||||||
18 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | 13 | ||||||||||||||||||||||||
8 | 16 | ||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
1. A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
2. a device that forwards data packets between computer networks
3. A group of computers, servers, and devices joined together, enabling communication and the exchange of data.
4. The arrangement of various elements of a computer network, such as computers, servers, routers, switches, etc., and the interconnections between them.
5. An HTML attribute used to define inline styles for a specific HTML element.
6. A top-level domain is the last part of a domain name that follows the final dot, such as .com, .org, or .net.
7. The measures and protocols in place to protect data, resources, and communication from unauthorized access, attacks, and threats.
8. The process of storing and serving website or application files on a server, making them accessible via the internet.
9. A network architecture where tasks are divided between servers and clients, with servers providing resources and clients requesting resources.
10. Cryptographic protocols designed to provide secure communication over a computer network.
11. Devices that have been compromised by malware and are part of a botnet.
12. A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity that enables them to collect and exchange data.
13. Glyphs or characters used to represent emotions or convey feelings in an instant messaging client.
14. Malware that enables unauthorized access to a computer, while hiding its presence from the user and antivirus software.
15. The speed at which data is transferred from a device to the internet.
16. A reference or navigation element within an HTML document that permits convenient user navigation to an alternative page or resource.
17. The ability for computers connected in a P2P network to share their computing power, storage space, or other resources.
18. A type of DDoS attack that uses amplification techniques to magnify the volume of traffic sent to a target, making the attack more effective.