My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

O-R Flashcards (1)

Security + SY0-601 Vocabulary List
Horizontales
A training that sends users fake phishing messages to test their skills
The situation in which systems consume all the memory, storage, processing time, or other resources available to them, rendering the system disabled or crippled for other uses
A standardized authentication protocol for PPP - It transmits usernames and passwords in the clear - It offers no form of encryption; it simply provides a means to transport the login credentials from the client to the authentication server *What does this acronym stand for?
A code review methodology that relies on a pair of developers with one writing code while explaining what they are doing and the other developer watching and reviewing
A term describing the validity and history of data or a device, used to determine if it is trustworthy
A technology that uses electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to identify a specific device *This includes a unique identifier so that when a nearby antenna/ transceiver activates the tag *What does this acronym stand for?
A type of sever that makes a single Internet connection and services request on behalf of many users
When a vulnerable website is fed script commands through form fields in such a manner as to trick the site, and the input is reflected back to the visitor as if it were original and legitimate content
A document that specifies requirements for password length, complexity, reuse, and similar issues
Verticales
The use of data to attempt to predict events, used in a security context to identify potential compromises and attacks
The mechanisms and procedures used to ensure or maintain security on a day-to-day basis
Software solutions that store, manage, and secure passwords and other information, allowing users to use strong passwords without memorizing individual complez passwords
The risk that the negative policy surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders
Restructuring an existing program or application
An open SSO standard maintained by the OpenID Foundation that can be used in conjunction with OAuth or its own
A tool that can be used to handle the administrative and privilege accounts *What does this acronym stand for?