My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

O-R Flashcards (5)

Security + SY0-601 Vocabulary List
Horizontales
Single-board computers, which means that they have all the features of a computer system on a single board, including network connectivity, storage, video output, input, CPU, and memory
A network device setting that attempts to prevent unauthorized devices from connecting to the network using MAC address filtering
Software that demands payment before restoring the data or system infected
When a device or network is theoretically overloaded based on the maximum potential usage of devices connected to it
A security setting that enforces a specific requirement, such as requiring specific character types, not allowing dictionary words, or other attempts to ensure the password is not easily cracked
Threat intelligence that is acquired from publicly available sources
A kind of file inclusion attack that allows the attacker to go a step further and execute code that is stored on a remote server
A tool used against a password file to attempt to recover the original password from a hashed or encrypted file
An activity used to test the strength and effectiveness of deployed security measures with an authorized attempted intrusion attack
A utility used to troubleshoot a connection to test whether a particular IP address is accessible
A situation that occurs when the security of a code segment depends on the sequence of events occurring with the system
Verticales
An attacker in which the attacker uses the same password against many different accounts, then uses another password against many accounts continuing to attempt breaches until their goal is met or they are unable to log in
The result when users obtain access to a resource that they wouldn't normally be able to access *It can also be done purposefully by an attacker seeking full access
The process of ensuring that software or code meets quality standards through testing and other validation processes *What does this acronym stand for?
A cloud service model in which the consumer can deploy tools using a platform but does not manage or control any of the underlying cloud infrastructure *What does this acronym stand for?