My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

I-O Flashcards (3)

Security + SY0-601 Vocabulary List
Horizontales
The measure of how long it takes to repair or restore a system or component once a failure occurs. *What does this acronym stand for?*
A secured and monitored system used to provide a way to securely operate in security zones with different security levels.
An attack that occurs when someone/ something that is trusted intercepts packets and retransmits them to another party. *What is the correct terminology for this*
Checking, scanning, filtering, or sanitizing input received from users (especially over the Internet) before processing the received input.
A common network tool that uses network address translation (NAT) to allow a single external public IP to serve many devices behind the router.
A software development phase, including patching, updating, minor modifications, and other work that goes into daily support.
An authentication option that is frequently used for password resets in the form of security questions. *What does this acronym stand for?*
A system used to spread or distribute network traffic load across several network links or network devices. The purpose of this is to obtain more optimal infrastructure utilization, minimize response time, maximize throughput,, reduce overloading, and eliminate bottlenecks.
Tools that show the current TCP/IP network configuration for the host they are run on.
Devices that provide intelligent power management and remote control of power delivered inside of server racks and other environments. *What does this acronym stand for? - HINT first word is Managed*
Verticales
Sometimes called procedural controls. These are controls that are implemented through processes like awareness, training, and oversight.
A penetration testing tool capable of performing port scans, ping sweeps, banner grabbing, network discovery, and more.
Risk that impacts more than one organization.
Tools that show the current TCP/IP network configuration for the host they are run on.
A type of fraud that sends fake invoices to organizations in hopes of receiving payment.
A boot process that provides a trusted log of all components like drivers and other components loaded during a boot process.
A physical device that connects computers and other network equipment to the transmission medium. *What does this acronym stand for?*
The fact that many different users share resources in the same cloud infrastructure.
The measurement of probability that a threat will become realized within a specific period of time.