1
.
The
Pillars
of
____________________
are
____________________
,
integrity
,
and
availability
.
2
.
A
____________________
is
a
known
or
unknown
____________________
in
a
website
that
could
result
in
the
loss
of
a
website's
confidentiality
,
integrity
,
and
/
or
availability
.
3
.
A
____________________
is
a
likelihood
that
a
threat
will
exploit
____________________
and
cause
damage
,
or
danger
,
to
a
customer's
website
or
its
visitors
.
Risk
can
be
____________________
through
preemptive
action
.
4
.
A
threat
is
what
could
take
____________________
of
a
website's
vulnerabilities
and
result
in
a
loss
of
a
website's
confidentiality
,
integrity
,
and
/
or
availability
.
5
.
A
website
____________________
(
or
a
hack
)
is
when
a
threat
has
exploited
a
vulnerability
in
a
website
and
has
affected
a
website's
confidentiality
,
integrity
,
and
/
or
availability
.
6
.
____________________
is
short
for
malicious
software
.
It
is
put
on
a
website
without
the
owner's
____________________
or
knowledge
and
is
intended
to
____________________
or
____________________
a
website
or
the
visitors
to
it
.
7
.
A
____________________
,
also
known
as
a
crawler
or
spider
,
is
a
program
or
automated
script
that
browse
the
Internet
with
a
specific
purpose
and
is
completely
automated
.
8
.
____________________
is
the
process
of
crawling
a
website
with
the
intent
of
stealing
original
content
.
9
.
SEO
stands
for
____________________
____________________
____________________
and
consist
of
various
techniques
employed
to
raise
a
site
or
page
rank
with
popular
search
engines
.
10
.
____________________
____________________
are
input
fields
that
are
usually
used
in
a
form
that
is
part
of
a
webpage
.
11
.
A
search
engine
,
like
Google
,
Bing
,
Yahoo
,
etc
.
will
____________________
you
if
they
crawl
a
website
for
indexing
and
rankings
but
find
malware
.
12
.
____________________
is
attempting
to
obtain
sensitive
information
for
malicious
reasons
by
acting
as
a
trustworthy
entity
.
13
.
DDoS
stands
for
____________________
____________________
____________________
____________________
and
tries
to
shut
down
a
server
,
or
website
,
by
trying
to
overwhelm
it
and
make
it
inaccessible
by
flooding
it
with
malicious
,
or
fake
,
requests
.
14
.
WAF
stands
for
____________________
____________________
____________________
and
is
used
to
block
malicious
traffic
,
or
requests
,
in
order
to
protect
websites
from
hackers
,
bots
,
scrapers
,
and
spammers
.
15
.
A
SQL
Injection
(
SQLi
)
compromise
happens
when
malicious
____________________
____________________
,
or
commands
,
are
inserted
into
an
entry
field
of
a
website
in
order
to
attack
the
____________________
of
the
site
.
16
.
XSS
stands
for
____________________
-
____________________
____________________
and
is
a
compromise
that
happens
when
____________________
and
/
or
____________________
is
inserted
into
an
entry
field
of
a
website
in
order
to
alter
the
functionality
of
the
site
and
launch
____________________
attacks
on
website
visitors
.
17
.
A
____________________
compromise
is
commonly
referred
to
as
a
.
htaccess
hack
,
which
is
the
file
that
is
affected
.
This
occurs
when
a
website
is
accessed
online
but
the
visitor
is
taken
to
an
unintended
site
.
18
.
A
.
____________________
file
is
used
to
define
directory
and
file
permissions
,
establish
URL
rewrite
rules
,
improve
search
engine
optimization
,
and
/
or
contain
custom
error
messages
.
19
.
A
____________________
____________________
is
commonly
found
on
sites
that
have
had
several
attacks
within
a
small
period
and
allows
hackers
easy
access
to
a
website
;
they
can
come
and
go
as
they
please
.
20
.
A
____________________
compromise
occurs
when
a
website
is
replaced
with
a
site
that
a
hacker
puts
up
,
commonly
a
one
-
page
site
glorifying
the
hacker
,
hacking
group
,
and
/
or
displays
an
opinion
or
belief
of
the
hacker
.
21
.
The
____________________
____________________
is
the
file
within
a
website
that
is
in
charge
of
displaying
the
initial
page
(
home
page
)
you
see
when
a
website
is
viewed
.
22
.
A
spam
/
SEO
compromise
will
have
____________________
for
things
like
pharma
,
Gucci
,
Nike
,
Prada
,
etc
.
,
by
way
of
backlinks
,
hyperlinks
,
or
headers
on
a
website
.
23
.
A
____________________
is
a
challenge
-
response
test
used
in
computing
as
an
attempt
to
ensure
that
the
response
is
generated
by
a
human
being
.
24
.
A
____________________
____________________
compromise
will
directly
or
indirectly
link
a
website
to
a
blacklisted
website
.
The
goal
of
this
compromise
it
to
get
the
infected
site
____________________
as
well
.