My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

I-O Flashcards (1)

Security + SY0-601 Vocabulary List
Horizontales
The process of removing a staff member from an organization, often as part of a termination process.
A form of input validation in which developers do not try to explicitly describe acceptable input but instead describe potentially malicious input that must be blocked.
An area of memory that stores an address of another location in memory.
The process that partially redacts sensitive information by replacing some or all sensitive fields with blank characters.
Cloud resources are available when and where you need them.
An attack that occurs when an employee, contractor, vendor, or other individual with authorized access to information and systems uses that access to wage an attack against the organization.
Agreements that provide an umbrella contract for the work that a vendor does with an organization over an extended period of time. *What does this acronym stand for?*
A means by which an organization improves its overall security by rotating employees among numerous job positions. This term serves two functions. First, it provides a type of knowledge redundancy. Second, moving personnel around reduces the risk of fraud, data modification, theft, sabotage, and misuse of information.
Firewalls that incorporate contextual information into their decision-making process, including information about users, applications, and business processes. They are the current state-of-the-art in network firewall protection and provide a variety of other advanced capabilities, but they also cost more than simpler products. *What does this acronym stand for?*
A type of metadata that is collected by phones and other mobile devices as they are used.
Verticales
A variation of a SQL injection attack; however, the focus of the attack is on the backend of an LDAP directory service rather than a database server. *What does this acronym stand for?*
Authentication that relies on two or more distinct authentication factors from the set of something you know, something you have, and something you are. *What does this acronym stand for?*
A key principle that relies on scaring or bullying an individual into taking a desired action.
Combines static and dynamic testing, analyzing the source code while testers interact with the application through exposed interfaces.
Granting the least amount of authorization to users so that they can perform their work tasks but nothing else.
An approach that describes the current and desired positioning of an organization along a continuum of progress.
A metric that describes the type of information alteration that might occur if an attacker successfully exploits the vulnerability.
A Cisco proprietary alternative to the Temporal Key Integrity Protocol (TKIP) for Wi-Fi Protected Access (WPA). This was developed to address deficiencies in TKIP before the 802.11i/WPA2 system was ratified as a standard. *What does this acronym stand for?*
One of the most commonly used forms of perimeter security control. The primary purpose of this is to discourage casual intruders, trespassers, prowlers, and would-be thieves who would rather perform their malicious activities in the dark.
A tool that provides network statistics by protocol; includes information about the local address and the remote address for each connection, as well as the state of TCP connections.