Tu Vung IT

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

exception: (n) ngoi l.

respective: tng ng interval: khong thi gian threshold: Ngng ca burst: s bng n exceed: (V) vt qu verification: Xc minh shun: (v) trnh abbreviate: (v) vit tt accomplish: (V) Thc hin, hnh ng illustrate: (V) minh ha confidentiality(n): bo mt integrity(n):tnh ton vn Adaptive Security Appliances: asa Inspection:(n) S kim tra. Trust: (s) s tin cy Untrust: (s) Khng tin cy. Simultaneously: (adv) ng thi. Fierce: (a) d tn, hung d. Unpredictable: (a) khng th on trc. Restrict: (v) Hn ch Failover: chuyn i d phng Redundancy: d phng Essence: (n) tnh cht.

Interosculate: (v) Lin vi nhau. Participate: (v) Tham gia. Esse: (n) Bn cht. Assess: (v) nh gi. Assessment (n): hnh ng nh gi. Whether: (lin t) c hay khng. Doubt: (n) S nghi ng. Corresponding (a): tng ng. Goal (n): ch, mc tiu Mastery (n): S nm vng Credit (n): long tin, s tin cy. Skew (a): lch, nghing. Guess (v,n): on, phng on. Harden (v): lm cho cng. Faculty (n): Kha hc Exemption (n): s min Overcome (v): khc phc Associate (n,a,v): kt hp Block (n): Khi, tng Reserve (n,a,v): dnh, d tr Represent (v): miu t, trnh by, i din cho. Fact: (n) Thc t. Per: (gii t) bng, qua, theo, cho mi. Tune (v): iu chnh

Suspicious (n) C s nghi ng Malicious (n) Him c, c c tm. Prior (a): trc, Background (n): nn
Scheme (n): K hoch Leverage(n): Tc dng

Trigger(v): Kch hot Gather (v): tp hp, thu thp Advanced (a): Tin tin, tin b Intercept (n): b chn Vulnerable (n): c th b tn thng, d b nguy him Target (n): Mc tiu Aware (a): quan tm Extensive (a): phm vi rng Granular (n): ht, c ht, ht Shun (n): trnh, xa lnh Exclude (v): Loi tr Clutter(v): S ln xn

You might also like