My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

E-I Flashcards (4)

Security + SY0-601 Vocabulary List
Horizontales
The patterns of ridges on the fingers of humans. Often used as a biometric authentication factor.
Designed to make training more enjoyable and help users retain the message of the campaign.
The rate at which a biometric solution rejects individuals it should have allowed. *What does this acronym stand for?*
A server room aisle that removes hot air from the facility.
A technique that matches specific features to an original image in a database.
A complete copy of a system or server.
A tool that simplifies the use of vulnerabilities by providing a modular approach to configuring and deploying vulnerability exploits.
Devices or applications that generate passwords that are not based on fixed time intervals but that instead generate passwords based on a nonrepeating one-way function, such as a hash or HMAC (Hash Message Authentication Code) operation. Also known as asynchronous dynamic password tokens. *What does this acronym stand for?*
A technique used to gather information without targets realizing they are providing it.
U.S. health-care law that creates security and privacy requirements for handling protected health information. *What does this acronym stand for?*
Verticales
An approach for finding flaws by thinking like the adversary who might attack the system in the real world.
An attack that executes the code contained within a file, allowing the attacker to fool the web server into executing arbitrary code.
A flagged event that isn't really an event and has been falsely triggered.
A key generated at time of need for use in a short or temporary timeframe. This key might be used only once or could be used for a communication session before being discarded.
The telltale signs that an attack has taken place and may include file signatures, log patterns, and other evidence left behind by attackers. *What does this acronym stand for?*
A technique that uses a constellation of satellites that send out GPS signals that are received with a compatible GPS receiver. Receiving a fix requires signals from at least three satellites. *What does this acronym stand for?*
The process of systematically identifying a network and its security posture.
A type of metadata that includes headers and other information found in an email.
A bogus system set up to attract and slow down a hacker.
A tool that is used to assemble and analyze TCP/IP packets.