My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

O-R Flashcards (4)

Security + SY0-601 Vocabulary List
Horizontales
A collection of technologies that provide the ability to balance network traffic and prioritize workloads *What does this acronym stand for?
Hardware device that supports thing like one-time passwords, public-key cryptography for security certificates, and various security protocols like FIDO (Fast Identity Online) and U2F
A technique that works by sending a web application more than one value for the same input variable
A metric that describes the type of account access that an attacker would need to exploit a vulnerability
A form of social engineering in which you ask someone for a piece of information that you are missing by making it look as if it is a legitimate request *Commonly sent via email
The attempts of attackers to gain persistent access by ensuring they have ongoing access to a system
An attacker that exploits trust relationships and attempts to have users unwittingly execute commands against a remote server
A cloud delivery model owned and managed internally
A centralized authentication authorization and accounting service, often used for VPN connections *What does this acronym stand for?
Policies offered by cloud providers that customers use to limit the actions that users of their accounts make take
Verticales
A document that defines the scope of security needs of an organization, prescribes solutions to manage security issues, and discuss the assets that need protection and the extent to which security solutions should go to provide the necessary protection
A tool that sends a coy of all the traffic sent to one switch port to another switch port for monitoring
A mechanism of action used by Data Loss Prevention (DLP) systems that watches for the telltale signs of sensitive information
A form of replay attack that takes place against the operating system rather than a web application
Messages sent to a user to inform them of an event
Programs that may not be wanted by the user but that are not as dangerous as other types of malware *What does this acronym stand for?