Toggle navigation
Create account
Sign in
Create flashcards
Courses
fiszka
fiszka
0
953 flashcards
guest3772881
start learning
download mp3
×
Perfect for auditory learners
–
Turn your words in an audiocourse and learn:
while riding on the bus or in a car
walking the dog
waiting in line
before bedtime
This function is only available for premium users.
activate a premium account
sample recording
print
×
Perfect outside
–
Print your words:
as a handy list
as flashcards to be cut out
This function is only available for premium users.
activate a premium account
an example of a printout
play
test yourself
Question
Answer
English Definition Example Polish
start learning
English Definition Example Polish
Threat
start learning
Threat
Intelligence Gathering
start learning
Intelligence Gathering
info
start learning
gen
about
start learning
about
potential
start learning
potential
or
start learning
or
active
start learning
active
threats Threat
start learning
Threats Threat
intelligence
start learning
intelligence
allowed
start learning
allowed
us
start learning
us
to
start learning
this
detect
start learning
detect
the
start learning
the
attack
start learning
attack
early. Analiza
start learning
early. Analysis
informacji
start learning
information
o
start learning
about
zagrożeniach
start learning
threats
Zero-day
start learning
Zero day
Vigilance Monitoring
start learning
Vigilance Monitoring
for
start learning
for
unknown
start learning
unknown
software
start learning
software
vulnerabilities Zero-day
start learning
Zero-day vulnerabilities
vigilance
start learning
vigilance
is
start learning
is
crucial
start learning
crucial
for
start learning
for
protecting
start learning
protecting
critical
start learning
critical
systems. Czujność
start learning
systems. Vigilance
wobec
start learning
to
luk
start learning
arc
typu
start learning
type
zero-day
start learning
zero-day
Threat
start learning
Threat
Detection Identifying
start learning
Detection Identifying
security
start learning
security
breaches
start learning
Breaches
or
start learning
or
malicious
start learning
malicious
activities Effective
start learning
activities Effective
threat
start learning
threat
detection
start learning
detection
stopped
start learning
stopped
the
start learning
the
ransomware
start learning
ransomware
attack. Wykrywanie
start learning
attack. Detection
zagrożeń
start learning
threats
Global
start learning
Global
Cyber
start learning
Cyber
Conflicts Cyberattacks
start learning
Conflicts Cyberattacks
involving
start learning
Involving
multiple
start learning
multiple
nations Global
start learning
nations Global
cyber
start learning
cyber
conflicts
start learning
conflicts
can
start learning
can
disrupt
start learning
disrupt
critical
start learning
critical
infrastructure. Globalne
start learning
infrastructure. Global
konflikty
start learning
conflicts
cybernetyczne
start learning
cybernetic
Generative
start learning
Generative
AI
start learning
AI
in
start learning
in
Security AI
start learning
Security AI
to
start learning
this
enhance
start learning
enhance
cybersecurity Generative
start learning
Cybersecurity Generative
AI
start learning
AI
in
start learning
in
security
start learning
security
helps
start learning
helps
simulate
start learning
simulate
attack
start learning
attack
scenarios. AI
start learning
AI scenarios
generatywna
start learning
generative
w
start learning
in
bezpieczeństwie
start learning
safety
Quantum
start learning
Quantum
Computing Next-gen
start learning
Next-gen Computing
computing
start learning
computing
for
start learning
for
encryption Quantum
start learning
Quantum encryption
computing
start learning
computing
may
start learning
may
break
start learning
break
current
start learning
current
encryption. Komputery
start learning
Encryption. Computers
kwantowe
start learning
quantum
Risk
start learning
Risk
Management Assessing
start learning
Management Assessment
and
start learning
and
mitigating
start learning
Mitigating
risks Risk
start learning
Risk
management
start learning
management
reduced
start learning
reduced
system
start learning
regime
vulnerabilities. Zarządzanie
start learning
Vulnerabilities. Management
ryzykiem
start learning
risk
Compliance Following
start learning
Compliance Following
laws
start learning
laws
and
start learning
and
security
start learning
security
standards We
start learning
standards We
must
start learning
must
ensure
start learning
the ensure
compliance
start learning
compliance
with
start learning
with
GDPR. Zgodność
start learning
GDPR Compliance
(compliance)
start learning
(compliance)
Application
start learning
Application
Security Protecting
start learning
Security Protecting
software
start learning
software
applications Application
start learning
Applications
security
start learning
security
prevents
start learning
Prevents
code
start learning
code
injection. Bezpieczeństwo
start learning
injection. Safety
aplikacji
start learning
applications
Cloud
start learning
Cloud
Security Securing
start learning
Security Securing
cloud
start learning
cloud
systems
start learning
systems
and
start learning
and
data Cloud
start learning
Data Cloud
security
start learning
security
is
start learning
is
a
start learning
and
top
start learning
top
priority
start learning
priority
for
start learning
for
SaaS
start learning
SaaS
firms. Bezpieczeństwo
start learning
firms. Security
chmury
start learning
clouds
Data
start learning
Date
Security Protecting
start learning
Security Protecting
stored
start learning
stored
and
start learning
and
transmitted
start learning
Transmitted
data Data
start learning
date Date
security
start learning
security
policies
start learning
policies
prevent
start learning
Prevent
data
start learning
date
breaches. Bezpieczeństwo
start learning
Security breaches
danych
start learning
data
Device
start learning
Device
Security Protecting
start learning
Security Protecting
hardware
start learning
hardware
devices Device
start learning
Devices Device
security
start learning
security
measures
start learning
measures
prevent
start learning
Prevent
unauthorized
start learning
unauthorized
access. Bezpieczeństwo
start learning
Access. Security
urządzeń
start learning
equipment
Endpoint
start learning
Endpoint
Security Protection
start learning
Security Protection
for
start learning
for
end-user
start learning
End-user
devices Endpoint
start learning
Endpoint devices
security
start learning
security
tools
start learning
tools
block
start learning
block
malware. Bezpieczeństwo
start learning
Malware. Security
punktów
start learning
points
końcowych
start learning
end points
Identity
start learning
Identity
and
start learning
and
Access
start learning
Access
Management
start learning
Management
(IAM) Managing
start learning
(IAM) Managing
user
start learning
user
identities
start learning
identities
and
start learning
and
permissions IAM
start learning
IAM permissions
ensures
start learning
Ensures
only
start learning
only
authorized
start learning
authorized
users
start learning
users
access
start learning
access
systems. Zarządzanie
start learning
systems. Management
tożsamością
start learning
identity
i
start learning
and
dostępem
start learning
access
Network
start learning
Network
Security Protecting
start learning
Security Protecting
networks
start learning
networks
from
start learning
from
intrusions Network
start learning
Intrusions Network
security
start learning
security
involves
start learning
involves
firewalls
start learning
firewalls
and
start learning
and
monitoring. Bezpieczeństwo
start learning
monitoring. Security
sieci
start learning
network
Security
start learning
Security
Operations
start learning
Operations
(SecOps) Coordinated
start learning
(SecOps) Coordinated
security
start learning
security
management SecOps
start learning
SecOps management
teams
start learning
teams
monitor
start learning
a monitor
and
start learning
and
respond
start learning
RESPOND
to
start learning
this
threats. Operacje
start learning
Threats. Operations
bezpieczeństwa
start learning
safety
Incident
start learning
Incident
Response Handling
start learning
Response Handling
security
start learning
security
breaches Incident
start learning
breaches Incident
response
start learning
response
plans
start learning
plans
reduce
start learning
reduce
damage
start learning
damage
from
start learning
from
attacks. Reakcja
start learning
Attacks. Reaction
na
start learning
on
incydenty
start learning
incidents
Zero
start learning
Zero
Trust Security
start learning
Trust Security
model
start learning
model
assuming
start learning
assuming
no
start learning
Well
automatic
start learning
automatic
trust Zero
start learning
Trust Zero
trust
start learning
trust
requires
start learning
requires
verification
start learning
verification
for
start learning
for
every
start learning
every
request. Model
start learning
request. Model
zerowego
start learning
zero
zaufania
start learning
trust
Cyber
start learning
Cyber
Resilience Ability
start learning
Resilience Ability
to
start learning
this
recover
start learning
recover
from
start learning
from
cyberattacks Cyber
start learning
Cyberattacks
resilience
start learning
resilience
keeps
start learning
keeps
services
start learning
services
running
start learning
running
after
start learning
after
incidents. Odporność
start learning
incidents. Resistance
cybernetyczna
start learning
cybernetic
Hybrid
start learning
Hybrid
Cloud Mix
start learning
Cloud Mix
of
start learning
of
private
start learning
private
and
start learning
and
public
start learning
public
clouds Hybrid
start learning
clouds Hybrid
cloud
start learning
cloud
balances
start learning
balances
flexibility
start learning
flexibility
and
start learning
and
control. Chmura
start learning
control. Cloud
hybrydowa
start learning
hybrid
DevSecOps Integrating
start learning
DevSecOps Integrating
security
start learning
security
into
start learning
into
DevOps DevSecOps
start learning
DevOps DevSecOps
ensures
start learning
Ensures
secure
start learning
secure
software
start learning
software
from
start learning
from
the
start learning
the
start. DevSecOps
start learning
start. DevSecOps
Cloud
start learning
Cloud
Infrastructure The
start learning
Infrastructure The
hardware
start learning
hardware
and
start learning
and
software
start learning
software
enabling
start learning
enabling
cloud
start learning
cloud
services Cloud
start learning
Cloud services
infrastructure
start learning
infrastructure
must
start learning
must
be
start learning
be
scalable
start learning
scalable
and
start learning
and
secure. Infrastruktura
start learning
secure infrastructure
chmurowa
start learning
cloud
Cyber
start learning
Cyber
Threat
start learning
Threat
Classification Organizing
start learning
Classification Organizing
threats
start learning
threats
by
start learning
would
type
start learning
type
and
start learning
and
impact Threat
start learning
Impact Threat
classification
start learning
classification
aids
start learning
AIDS
prioritization. Klasyfikacja
start learning
prioritization. Classification
zagrożeń
start learning
threats
Human
start learning
Human
Factors
start learning
Factors
in
start learning
in
Cyber
start learning
Cyber
Defence Role
start learning
Defense Role
of
start learning
of
human
start learning
human
behavior
start learning
behavior
in
start learning
in
security Training
start learning
Security Training
addresses
start learning
addresses
human
start learning
human
factors
start learning
factors
in
start learning
in
cyber
start learning
cyber
defence. Czynnik
start learning
defense. Factor
ludzki
start learning
human
w
start learning
in
cyberobronie
start learning
cyber defense
Geopolitical
start learning
Geopolitical
Cyber
start learning
Cyber
Impact Political
start learning
Political Impact
influence
start learning
influence
on
start learning
he
cyber
start learning
cyber
threats Conflicts
start learning
Threats Conflicts
escalate
start learning
escalate
geopolitical
start learning
geopolitical
cyber
start learning
cyber
impacts. Geopolityczny
start learning
Geopolitical impacts
wpływ
start learning
impact
na
start learning
on
cyberbezpieczeństwo
start learning
cyber security
Security
start learning
Security
Continuity Maintaining
start learning
Continuity Maintaining
security
start learning
security
during
start learning
during
disruptions Continuity
start learning
Disruptions Continuity
plans
start learning
plans
ensure
start learning
the ensure
ongoing
start learning
ongoing
protection. Ciągłość
start learning
protection. Continuity
bezpieczeństwa
start learning
safety
Cultural
start learning
Cultural
Security
start learning
Security
Expectations Security
start learning
Expectations Security
norms
start learning
norms
in
start learning
in
different
start learning
different
cultures Global
start learning
cultures Global
teams
start learning
teams
must
start learning
must
respect
start learning
respect
cultural
start learning
cultural
security
start learning
security
expectations. Kulturowe
start learning
expectations. Cultural
oczekiwania
start learning
expectations
bezpieczeństwa
start learning
safety
Transparency
start learning
Transparency
in
start learning
in
Security Openness
start learning
Security Openness
about
start learning
about
security
start learning
security
practices Transparency
start learning
practices Transparency
builds
start learning
builds
trust
start learning
trust
with
start learning
with
customers. Przejrzystość
start learning
Customers. Transparency
w
start learning
in
bezpieczeństwie
start learning
safety
Behavioral
start learning
Behavioral
Science
start learning
Science
in
start learning
in
Security Studying
start learning
Security Studying
human
start learning
human
behavior
start learning
behavior
for
start learning
for
security Behavioral
start learning
Security Behavioral
science
start learning
science
helps
start learning
helps
reduce
start learning
reduce
insider
start learning
insider
threats. Nauka
start learning
threats. Science
o
start learning
about
zachowaniach
start learning
behaviors
w
start learning
in
bezpieczeństwie
start learning
safety
Regulatory
start learning
regulators
Compliance Meeting
start learning
Compliance Meeting
legal
start learning
legal
security
start learning
security
obligations Regulatory
start learning
Regulatory Obligations
compliance
start learning
compliance
is
start learning
is
mandatory
start learning
mandatory
in
start learning
in
finance. Zgodność
start learning
Finance. Compliance
z
start learning
with
regulacjami
start learning
regulations
Application
start learning
Application
Security
start learning
Security
Strategies Plans
start learning
Strategies Plans
to
start learning
this
secure
start learning
secure
applications Strategies
start learning
Application Strategies
address
start learning
address
common
start learning
common
vulnerabilities. Strategie
start learning
Vulnerabilities. Strategies
bezpieczeństwa
start learning
safety
aplikacji
start learning
applications
Remote
start learning
Remote
Work
start learning
Work
Security Protecting
start learning
Security Protecting
remote
start learning
remote
workers
start learning
workers
and
start learning
and
devices VPNs
start learning
devices VPNs
improve
start learning
improve
remote
start learning
remote
work
start learning
work
security. Bezpieczeństwo
start learning
security.
pracy
start learning
working
zdalnej
start learning
remote
Security
start learning
Security
for
start learning
for
Agility Adapting
start learning
Agility Adapting
security
start learning
security
to
start learning
this
fast
start learning
fast
changes Agile
start learning
Agile changes
firms
start learning
firms
need
start learning
need
adaptive
start learning
adaptive
security. Bezpieczeństwo
start learning
security.
w
start learning
in
środowisku
start learning
medium
zwinnym
start learning
agile
Collaboration
start learning
Collaboration
Security Protecting
start learning
Security Protecting
data
start learning
date
in
start learning
in
teamwork
start learning
team work
tools Collaboration
start learning
Collaboration tools
security
start learning
security
keeps
start learning
keeps
shared
start learning
shared
files
start learning
files
safe. Bezpieczeństwo
start learning
safe. Security
współpracy
start learning
team work
Cyber
start learning
Cyber
Hygiene Good
start learning
Hygiene Good
daily
start learning
daily
security
start learning
security
practices Cyber
start learning
Cyber practices
hygiene
start learning
hygiene
reduces
start learning
reduces
the
start learning
the
risk
start learning
risk
of
start learning
of
attacks. Higiena
start learning
attacks. Hygiene
cybernetyczna
start learning
cybernetic
Insider
start learning
Insider
Threat
start learning
Threat
Management Handling
start learning
Management Handling
risks
start learning
risks
from
start learning
from
internal
start learning
internal
users Monitoring
start learning
User Monitoring
helps
start learning
helps
manage
start learning
manage
insider
start learning
insider
threats. Zarządzanie
start learning
threats. Management
zagrożeniami
start learning
threats
wewnętrznymi
start learning
internal
Security
start learning
Security
Automation Automating
start learning
Automation Automation
security
start learning
security
tasks Automation
start learning
tasks Automation
speeds
start learning
speeds
up
start learning
up
threat
start learning
threat
response. Automatyzacja
start learning
response. Automation
bezpieczeństwa
start learning
safety
Cloud
start learning
Cloud
Transformation Migrating
start learning
Transformation Migrating
to
start learning
this
cloud
start learning
cloud
services Transformation
start learning
Services Transformation
requires
start learning
requires
careful
start learning
careful
planning. Transformacja
start learning
planning. Transformation
chmurowa
start learning
cloud
GenAI
start learning
GenAI
Security
start learning
Security
Use
start learning
Use
Cases Using
start learning
Cases Using
generative
start learning
generative
AI
start learning
AI
in
start learning
in
security GenAI
start learning
security GenAI
predicts
start learning
Predicts
possible
start learning
possible
attack
start learning
attack
vectors. Zastosowania
start learning
vectors. Applications
AI
start learning
AI
generatywnej
start learning
generative
w
start learning
in
bezpieczeństwie
start learning
safety
Quantum-Safe
start learning
Quantum-Safe
Encryption Encryption
start learning
Encryption Encryption
resistant
start learning
resistant
to
start learning
this
quantum
start learning
quantum
computing Quantum-safe
start learning
Quantum-safe computing
methods
start learning
methods
protect
start learning
protect
future
start learning
futures
data. Szyfrowanie
start learning
data. Encryption
odporne
start learning
resistant
na
start learning
on
komputery
start learning
computers
kwantowe
start learning
quantum
Supply
start learning
Supply
Chain
start learning
Chain
Vulnerabilities Weaknesses
start learning
Vulnerabilities Weaknesses
in
start learning
in
supplier
start learning
supplier
security Suppliers
start learning
Security Suppliers
can
start learning
can
introduce
start learning
introduce
vulnerabilities. Luki
start learning
vulnerabilities.
w
start learning
in
łańcuchu
start learning
chain
dostaw
start learning
supply
Cyber
start learning
Cyber
Infrastructure All
start learning
Infrastructure All
systems
start learning
systems
supporting
start learning
supporting
cybersecurity Infrastructure
start learning
Cybersecurity Infrastructure
includes
start learning
includes
hardware,
start learning
hardware,
software,
start learning
software,
and
start learning
and
staff. Infrastruktura
start learning
staff. Infrastructure
cybernetyczna
start learning
cybernetic
Threat
start learning
Threat
Landscape Current
start learning
Landscape Current
overview
start learning
overview
of
start learning
of
threats The
start learning
threats The
landscape
start learning
landscape
changes
start learning
changes
rapidly
start learning
rapidly
with
start learning
with
new
start learning
new
tech. Krajobraz
start learning
tech. Landscape
zagrożeń
start learning
threats
Penetration
start learning
Penetration
Testing Simulating
start learning
Testing Simulating
attacks
start learning
attacks
to
start learning
this
find
start learning
find
weaknesses Pen
start learning
weaknesses Pen
tests
start learning
tests
improve
start learning
improve
security
start learning
security
posture. Testy
start learning
Posture. Tests
penetracyjne
start learning
penetrative
Security
start learning
Security
Awareness
start learning
Awareness
Training Educating
start learning
Training Educating
users
start learning
users
on
start learning
he
threats Training
start learning
Threats Training
reduces
start learning
reduces
phishing
start learning
phishing
risks. Szkolenie
start learning
Risks Training
świadomości
start learning
awareness
bezpieczeństwa
start learning
safety
Data
start learning
Date
Breach Unauthorized
start learning
Breach Unauthorized
access
start learning
access
to
start learning
this
data A
start learning
date A
breach
start learning
breach
exposed
start learning
exposed
millions
start learning
millions
of
start learning
of
records. Wycieki
start learning
records. Leaks
danych
start learning
data
Ransomware Malware
start learning
Ransomware Malware
demanding
start learning
demanding
payment Ransomware
start learning
payment Ransomware
locked
start learning
locked
critical
start learning
critical
files. Ransomware
start learning
files. Ransomware
Phishing Deceptive
start learning
Phishing Deceptive
attempt
start learning
attempt
to
start learning
this
steal
start learning
steal
data Phishing
start learning
Data Phishing
emails
start learning
emails
targeted
start learning
targeted
employees. Phishing
start learning
employees. Phishing
Malware Malicious
start learning
Malware Malicious
software Malware
start learning
Software Malware
infected
start learning
infected
multiple
start learning
multiple
systems. Złośliwe
start learning
systems. Malicious
oprogramowanie
start learning
software
Botnet Network
start learning
Botnet Network
of
start learning
of
infected
start learning
infected
devices Botnets
start learning
devices Botnets
can
start learning
can
launch
start learning
launch
large
start learning
large
DDoS
start learning
DDoS
attacks. Botnet
start learning
Botnet attacks
Firewall System
start learning
Firewall System
blocking
start learning
blocking
unauthorized
start learning
unauthorized
access Firewalls
start learning
Access Firewalls
protect
start learning
protect
network
start learning
network
perimeters. Zapora
start learning
perimeters. Dam
sieciowa
start learning
network
Antivirus Software
start learning
Antivirus Software
detecting
start learning
detecting
malicious
start learning
malicious
files Antivirus
start learning
Antivirus files
software
start learning
software
blocked
start learning
blocked
the
start learning
the
trojan. Antywirus
start learning
Trojan. Antivirus
Patch
start learning
patch
Management Updating
start learning
Management Updating
software
start learning
software
to
start learning
this
fix
start learning
fix
vulnerabilities Patch
start learning
vulnerabilities Patch
management
start learning
management
prevents
start learning
Prevents
exploits. Zarządzanie
start learning
exploits. Management
poprawkami
start learning
amendments
Encryption Securing
start learning
Encryption Securing
data
start learning
date
by
start learning
would
coding
start learning
coding
it Encryption
start learning
it Encryption
protects
start learning
protects
sensitive
start learning
sensitive
files. Szyfrowanie
start learning
files. Encryption
Multi-Factor
start learning
Multi-Factor
Authentication Using
start learning
Authentication Using
multiple
start learning
multiple
ID
start learning
ID
methods MFA
start learning
MFA methods
stops
start learning
stops
many
start learning
mana
account
start learning
account
breaches. Uwierzytelnianie
start learning
breaches. Authentication
wieloskładnikowe
start learning
multi-component
Access
start learning
Access
Control Restricting
start learning
Control Restricting
resource
start learning
resource
access Access
start learning
Access
control
start learning
control
policies
start learning
policies
limit
start learning
limit
exposure. Kontrola
start learning
exposure. Control
dostępu
start learning
access
SIEM Security
start learning
SIEM Security
Information
start learning
Information
and
start learning
and
Event
start learning
Event
Management SIEM
start learning
Management SIEM
systems
start learning
systems
collect
start learning
collect
and
start learning
and
analyze
start learning
analyze
logs. SIEM
start learning
SIEM logs
SOC Security
start learning
SOC Security
Operations
start learning
Operations
Center SOC
start learning
Center SOC
analysts
start learning
analysts
monitor
start learning
a monitor
for
start learning
for
incidents. Centrum
start learning
incidents. Center
Operacji
start learning
Operation
Bezpieczeństwa
start learning
Safety
Threat
start learning
Threat
Hunting Proactively
start learning
Hunting Proactively
seeking
start learning
seeking
threats Hunting
start learning
Threats Hunting
reveals
start learning
Reveals
hidden
start learning
hidden
malware. Polowanie
start learning
Malware Hunt
na
start learning
on
zagrożenia
start learning
threats
Vulnerability
start learning
Vulnerability
Assessment Evaluating
start learning
Assessment Evaluating
weaknesses Assessments
start learning
weaknesses assessments
guide
start learning
guide
patch
start learning
patch
priorities. Ocena
start learning
Priorities. Rating
podatności
start learning
susceptibility
Red
start learning
Red
Team Offensive
start learning
Team Offensive
security
start learning
security
testers Red
start learning
Testers Red
teams
start learning
teams
simulate
start learning
simulate
real
start learning
real
attacks. Zespół
start learning
Attacks. Team
czerwony
start learning
red
Blue
start learning
Blue
Team Defensive
start learning
Team Defensive
security
start learning
security
staff Blue
start learning
Staff Blue
teams
start learning
teams
defend
start learning
defend
against
start learning
against
red
start learning
red
teams. Zespół
start learning
teams. Team
niebieski
start learning
blue
Purple
start learning
Purple
Team Mix
start learning
Team Mix
of
start learning
of
red
start learning
red
and
start learning
and
blue
start learning
blue
teams Purple
start learning
Team Purple
teams
start learning
teams
improve
start learning
improve
collaboration. Zespół
start learning
collaboration. Team
fioletowy
start learning
violet
Sandboxing Isolating
start learning
Sandboxing Isolating
code
start learning
code
for
start learning
for
testing Sandboxing
start learning
Sandboxing testing
limits
start learning
limits
malware
start learning
malware
damage. Piaskownica
start learning
damage. Sandbox
Data
start learning
Date
Loss
start learning
Loss
Prevention Tools
start learning
Prevention Tools
to
start learning
this
stop
start learning
stop and give way
data
start learning
date
leaks DLP
start learning
DLP leaks
software
start learning
software
monitors
start learning
monitors
sensitive
start learning
sensitive
info. Zapobieganie
start learning
info. Prevention
utracie
start learning
loss
danych
start learning
data
Forensics Investigating
start learning
Forensics Investigating
cyber
start learning
cyber
incidents Forensics
start learning
incidents Forensics
recovered
start learning
Recovered
deleted
start learning
deleted
logs. Analiza
start learning
logs. Analysis
kryminalistyczna
start learning
forensic
Disaster
start learning
Disaster
Recovery Restoring
start learning
Recovery Restoring
systems
start learning
systems
after
start learning
after
failures DR
start learning
failures DR
plans
start learning
plans
shorten
start learning
shorten
downtime. Odzyskiwanie
start learning
downtime. Recovery
po
start learning
after
awarii
start learning
failure
Business
start learning
Business
Continuity Keeping
start learning
Continuity Keeping
operations
start learning
operations
running Continuity
start learning
running continuity
planning
start learning
planning
reduces
start learning
reduces
losses. Ciągłość
start learning
Losses. Continuity
działania
start learning
actions
Security
start learning
Security
Policy Documented
start learning
Policy Documented
security
start learning
security
rules Policies
start learning
Rules Policies
guide
start learning
guide
staff
start learning
staff
behavior. Polityka
start learning
behavior. Politics
bezpieczeństwa
start learning
safety
Incident
start learning
Incident
Report Documenting
start learning
Report Documenting
a
start learning
and
security
start learning
security
event Reports
start learning
Event Reports
improve
start learning
improve
future
start learning
futures
responses. Raport
start learning
responses. Report
incydentu
start learning
incident
Security
start learning
Security
Audit Reviewing
start learning
Audit Reviewing
security
start learning
security
measures Audits
start learning
Measures Audits
ensure
start learning
the ensure
compliance. Audyt
start learning
Compliance Audit
bezpieczeństwa
start learning
safety
Key
start learning
Key
Management Handling
start learning
Management Handling
cryptographic
start learning
cryptographic
keys Key
start learning
keys Key
management
start learning
management
protects
start learning
protects
encryption. Zarządzanie
start learning
Encryption Management
kluczami
start learning
keys
Certificate
start learning
Certificate
Management Handling
start learning
Management Handling
SSL/TLS
start learning
SSL/TLS
certificates Certificates
start learning
Certificates
secure
start learning
secure
web
start learning
web
traffic. Zarządzanie
start learning
Traffic Management
certyfikatami
start learning
certificates
Cloud
start learning
Cloud
Access
start learning
Access
Security
start learning
Security
Broker Tool
start learning
Broker Tool
for
start learning
for
securing
start learning
securing
cloud
start learning
cloud
use CASB
start learning
use CASB
monitors
start learning
monitors
cloud
start learning
cloud
activity. Pośrednik
start learning
activity. Intermediary
bezpieczeństwa
start learning
safety
chmury
start learning
clouds
Secure
start learning
Secure
Coding Writing
start learning
Coding Writing
code
start learning
code
with
start learning
with
security
start learning
security
in
start learning
in
mind Secure
start learning
Mind Secure
coding
start learning
coding
reduces
start learning
reduces
vulnerabilities. Bezpieczne
start learning
vulnerabilities. Safe
kodowanie
start learning
coding
Log
start learning
Log
Management Collecting
start learning
Management Collecting
and
start learning
and
analyzing
start learning
analyzing
logs Logs
start learning
logs
reveal
start learning
reveal
suspicious
start learning
suspicious
activity. Zarządzanie
start learning
activity. Management
logami
start learning
logos
Security
start learning
Security
Metrics Measuring
start learning
Metrics Measuring
security
start learning
security
performance Metrics
start learning
Performance Metrics
track
start learning
track
risk
start learning
risk
reduction. Metryki
start learning
reduction. Metrics
bezpieczeństwa
start learning
safety
Anomaly
start learning
Anomaly
Detection Spotting
start learning
Detection Spotting
unusual
start learning
unusual
activity Anomalies
start learning
activity anomalies
may
start learning
may
indicate
start learning
indicate
breaches. Wykrywanie
start learning
Breaches. Detection
anomalii
start learning
anomaly
Risk
start learning
Risk
Assessment Identifying
start learning
Assessment Identifying
and
start learning
and
evaluating
start learning
Evaluating
risks Assessments
start learning
Risk Assessments
guide
start learning
guide
security
start learning
security
strategy. Ocena
start learning
Strategy. Assessment
ryzyka
start learning
risks
Security
start learning
Security
Orchestration Coordinating
start learning
Orchestration Coordinating
security
start learning
security
tools Orchestration
start learning
Orchestration tools
improves
start learning
Improves
efficiency. Orkiestracja
start learning
efficiency. Orchestration
bezpieczeństwa
start learning
safety
Intrusion
start learning
Intrusion
Detection
start learning
detection
System Monitoring
start learning
Monitoring System
for
start learning
for
malicious
start learning
malicious
activity IDS
start learning
activity IDS
alerts
start learning
alerts
on
start learning
he
suspicious
start learning
suspicious
traffic. System
start learning
traffic. System
wykrywania
start learning
detection
włamań
start learning
intrusion
Intrusion
start learning
Intrusion
Prevention
start learning
Prevention
System Blocking
start learning
System Blocking
detected
start learning
detected
threats IPS
start learning
Threats IPS
stops
start learning
stops
malicious
start learning
malicious
traffic. System
start learning
traffic. System
zapobiegania
start learning
prevention
włamaniom
start learning
burglaries
Web
start learning
Web
Application
start learning
Application
Firewall Protecting
start learning
Firewall Protecting
web
start learning
web
apps WAF
start learning
WAF apps
blocks
start learning
blocks
SQL
start learning
SQL
injection
start learning
injection
attempts. Zapora
start learning
Attempts. Firewall
aplikacji
start learning
applications
webowych
start learning
web-based
Secure
start learning
Secure
Sockets
start learning
Sockets
Layer Protocol
start learning
Layer Protocol
for
start learning
for
secure
start learning
secure
communication SSL
start learning
SSL communication
encrypts
start learning
encrypts
web
start learning
web
traffic. Bezpieczna
start learning
traffic. Safe
warstwa
start learning
layer
gniazd
start learning
slots
Transport
start learning
Transport
Layer
start learning
Layer
Security Successor
start learning
Security Successor
to
start learning
this
SSL TLS
start learning
SSL TLS
secures
start learning
secures
internet
start learning
the Internet
communication. Bezpieczeństwo
start learning
Communication. Security
warstwy
start learning
layer
transportowej
start learning
transport
Security
start learning
Security
Patch Update
start learning
Patch Update
to
start learning
this
fix
start learning
fix
vulnerabilities Apply
start learning
vulnerabilities Apply
patches
start learning
patches
to
start learning
this
avoid
start learning
avoid
exploits. Łatka
start learning
exploits. Patch
bezpieczeństwa
start learning
safety
Create flashcards
English
You must sign in to write a comment
×
Main
Progress bar
Clock
Enforce good response
Content
Text
Example text
images
Recordings
Example recordings
recordings native
Grammar highlighting
Retyping options
ignore:
spaces
diacritics
brackets
punctuation
capital letters
no article
combine shortcuts
order
report an error
Thank you for reporting :)
1
2
3
4
check
next
I'm right ↑
(
Tip:
Pressing
enter
considers the answer to be
wrong
Tip2:
in order to see the question again, click on the notepad )
revise
I knew it
show answer
check
next
I'm right ↑
(
Tip:
Pressing
enter
considers the answer to be
wrong
Tip2:
in order to see the question again, click on the notepad )
Well done, you're doing fine:)
The creator of these flashcards is Guest3772881.
Click here to create your own download :)
If you prefer ready, try out our professional courses.
Academic Word List
try it for free
Cockney
try it for free
Repeat all
Repeat difficult flashcards
End of round
1
Summary
round
I knew it
revise
1
(
)
(
)
Next round
revise what you didn't know
`
1
2
3
4
5
6
7
8
9
0
-
=
Nederlands, Vlaams
English
American English
Français
Deutsch
italiano
Norsk
język polski
português
русский язык
español
Svenska
українська мова
gjuha shqipe
العربية
euskara
беларуская мова
български език
català, valencià
中文, 汉语, 漢語
hrvatski jezik
český jazyk
dansk
Esperanto
eesti keel
føroyskt
suomen kieli
galego
ქართული
ελληνικά
עברית
हिन्दी, हिंदी
magyar
Íslenska
Bahasa Indonesia
日本語, にほんご
ಕನ್ನಡ
Қазақша
한국어, 韓國語, 조선어, 朝鮮語
latine
latviešu valoda
lietuvių kalba
Lëtzebuergesch
македонски јазик
bahasa Melayu, بهاس ملايو
Malti
Papiamento
فارسی
Português brasileiro
limba română
rumantsch grischun
Gàidhlig
српски језик
slovenský jazyk
slovenski jezik
ไทย
Xitsonga
Setswana
Türkçe
اردو
Tiếng Việt
isiXhosa
ייִדיש
isiZulu
q
w
e
r
t
y
u
i
o
p
[
]
\
a
s
d
f
g
h
j
k
l
;
'
z
x
c
v
b
n
m
,
.
/
Ctrl + Alt
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
×
Select the correct answer
create a new test
×
Pair all the words as quickly as possible!
0
steps
New game:
4x3
5x4
6x5
7x6
×
Log in
Log in
Sign in
Login or Email
Password
Sign in
Forgot your password?
Don't have an account?
Log in
Log in
Create account
Get Started with this Free Course!
No Cost. No Obligation. No Spam.
Your email address
Create account
Already have an account?
I accept the
terms
and
privacy policy