My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

E-I Flashcards (2)

Security + SY0-601 Vocabulary List
Horizontales
The process of determining what information is accessible to what parties and for what purposes.
Any cloud delivery model that combines two or more of the other delivery model types.
A method of testing that intentionally enters invalid input to see if the application can handle it.
The use of someone else's identity.
Procedures that describe how the organization will respond to subpoenas, court orders, and other legitimate requests to produce digital evidence.
The protocol used for communication between a web server and a web browser. *What does this acronym stand for?*
A document that offers recommendations on how standards and baselines are implemented.
An authentication expansion system where new or custom mechanisms that perform authentication can be added to existing systems. *What does this acronym stand for?*
People who use hacking techniques to accomplish an activist goal.
Verticales
A backup that stores only those files that have been modified since the time of the most recent full or incremental backup.
Part of deception efforts that provides additional targets for attackers.
An attack in which attackers insert their own HTML code into a web page.
A model of cloud computing that utilizes virtualization; clients pay an outsourcer for the resources used. *What does this acronym stand for?*
A configuration in which a backup facility is maintained in constant working order, with a full complement of servers, workstations, and communications links ready to assume primary operations responsibilities.
The rate at which a biometric solution allows in individuals it should have rejected. *What does this acronym stand for?*
The risk of monetary damage to the organization as the result of a data breach.
A principle of system resilience, which says that systems should be able to automatically provision resources to scale when necessary and then automatically deprovision those resources to reduce capacity (and cost) when it is no longer needed.
The original level of risk that exists before implementing any controls.
A provider of identity in a federation that makes assertions about identities to relying parties and releases information to relying parties about identity holders. *What does this acronym stand for?*
Two or more networked honeypots used in tandem to monitor or re-create larger, more diverse network arrangements.