My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

O-R Flashcards (2)

Security + SY0-601 Vocabulary List
Horizontales
Repeating the use of a password, often on unrelated systems
The implementation of secondary or alternate solutions or the means to perform work tasks or accomplish IT functions
A document that outlines privacy commitments
Nonencrypted data
A protocol tool that encapsulates EAP methods within a TLS tunnel that provides authentication and potentially encryption *What does this acronym stand for?
A kind of risk assessment that uses numeric data in the analysis, resulting in assessments that allow the straightforward prioritization of risk
Procedures that describe the frequency and process of applying patches to applications and systems under the organization's care
A measure of how much loss can be accepted by the organization when a disaster occurs *This is the maximum amount of time that can elapse between your backups, thus determing how much data could be lost in a disaster *What does this acronym stand for?
A management interface that is not accessed in the same way that the device or system is used *For network devices, this may be a separate port and VLAN, or a console
When someone claiming to be someone else convinces someone else to give up sensitive or personal information
Verticales
The control access measures used to restrict physical access and prevent direct contact with systems or areas within a facility to protect assets and resources
A kind of risk assessment that substitutes subjective judgments and categories for strict numerical analysis - Allowing the assessment of risk that are difficult to quantify
Any data item that is linked back to the human from whom it was gleaned *What does this acronym stand for?
A type of access control that is deployed to thwart or stop unwanted or unauthorized activity from occurring
A term used to describe a penetration testing team that attemps to break into systems; the aggressor team