My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

R-S Flashcards (1)

Security + SY0-601 Vocabulary List
Horizontales
A secondary network used to consolidate and manage various storage devices *What does this acronym stand for?
A type of proxy that is placed between servers and clients and that is used to help with load balancing and caching of content
The process of calculating the risks that exist in terms of costs, number, frequency, and so forth
Risk that occurs when an organization licenses software from a vendor and intentionally or accidentally runs afoul of usage limitations that expose the customer to financial and legal risk
Analyzes by reviewing the code for an application
A firewall that filters traffic by examining data from a message header *What is this term also known as
An HTTP cookie with the secure flag set, limiting the cookie to being sent via secure channels (HTTPS)
Evaluates the security of software without running it by analyzing either the source code or the compiled application
A form of nondiscretionary access controls that employs job function roles to regulate subject access to objects *What does this acronym stand for?
Documents that define mandatory requirements for the equal use of hardware, software, technology, and security controls
Unwanted, unsolicited email sent in bulk
A strategy of dealing with risk in which it is decided that the best approach is to offload some of the risk through insurance, third-party contracts, and/or shared responsibility
Verticales
An authentication method in WPA-3 that relies on a secure password-based authentication and password-authenticated key agreement to prevent brute-force attacks like those that would be used against preshared keys *What does this acronym stand for?
A principle of application resilience that says that applications should be designed so that computing resources they require may be incrementally added to support increasing demand
The seriousness of an event to an organization based upon a combination of the likelihood of that event occurring and the negative imact of the event if it does occur
A part of the contract between the cloud service and an organization, which provides either a direct ability to audit the cloud provider or an agreement to use a third-party audit agency
A security system or appliance used for monitoring and analysis of log and security data *What does this acronym stand for?
Signs placed in visible locations as part of organization processes or security