My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

1-C Flashcards (2)

Security + SY0-601 Vocabulary List
Horizontales
A key principle that relies on the fact that most people will obey someone who appears to be in charge or knowledgeable, regardless of whether they actually are or not
Switch security feature that blocks Spanning Tree Protocol (STP) attacks by preventing updates from unauthorized ports
Centralized locations for the storage and management of application source code
The IEEE standard that defines port-based security for network access control *IEEE = Institute of Electrical and Electronics Engineers*
A metric that describes the type of disruption that might occur if an attacker successfully exploits a vulnerability
Server room aisles that blow cold air from the floor
A type of Denial-of-Service (DoS) attack that occurs when more data is put into a buffer than it can hold, thereby overflowing it
In a penetration test they are the defenders who must secure systems and networks from attacks
Reviews of security controls (compared to audits or in-depth reviews) that are typically requested by the security organization itself in an effort to engage in process improvement
Allocates large volumes of storage for use by virtual server instance(s)
Verticales
Determination of the importance of an asset to the business
Hijacking a Bluetooth connection to eavesdrop or extract information from devices
A model for enabling global, convenient, and on-demand network access to a shared pool of configurable computing resources
Independent organizations that provide third-party assessments of cloud services and operations
A process that the organization will follow for accepting new assets (such as computers and mobile devices) into inventory
Standby facilities large enough to handle the processing load of an organization and with appropriate electrical and environmental support systems
A kind of wireless connection that provides connectivity for mobile devices like cell phones by dividing geographic areas into "cells" with tower coverage allowing wireless communications between devices and towers or cell sites
An attack that allows hackers to connect with your Bluetooth devices without your knowledge and extract information from them. This can offer attackers access to your contact lists, your data, and even your conversations
A way to confirm the authenticity of their code to end users