PCI DSS {Ans: A set of comprehensive requirements for enhancing payment account data security by controlling and protecting credit card data.}Jailbreaking {Ans: Modifying an Apple mobile device to remove software restrictions.}SEH {Ans: Provides control over what the application should do when faced with a runtime or syntax ERROR.}Pseudo-Anonymization {Ans: Replaces sensitive data elements within a dataset with pseudonyms (artificial identifiers). A second file contains a matching table that can be used to reverse this process.}NetFlow {Ans: HARDWARE FEATURE that allows administrators to view and analyze network activity on a router/switch.}When email is digitally signed using asymmetric encryption, the PUBLIC key is used for ______(a)_______ and the PRIVATE key is used for ______(b)______. {Ans: (a) decryption (b) encryption/signing}EAP-FAST {Ans: Cisco-designed replacement for LEAP. Supports certificates, but they are optional.}logger {Ans: A Linux command line utility used to ADD entries to the /var/log/syslog file.}OFB {Ans: A stream mode of DES that uses portions of the key for feedback.}NNTP {Ans: An application protocol used for transporting Usenet news articles (netnews) between news servers and for READING and POSTING articles by end user client applications. Uses TCP port 119.}UTM {Ans: Combines multiple security