My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

R-S Flashcards (2)

Security + SY0-601 Vocabulary List
Horizontales
Watching someone when they enter their username, password, or sensitive data
A derogatory term for people who use hacking techniques but have limited skills
Used to practice security processes and procedures, and attempt to emulate an actual event in a safe way to provide useful information and feedback
Random data used as input for a one-way cryptographic hash to help prevent brute-force attacks against the hash
A variation of mandatory access controls *A rule-based system uses a set of rules, restrictions, or filters to determine what can and cannot occur on the system, such as granting subject access, performing an action on an object, or accessing a resource
The safeguards of countermeasures used to address security vulnerabilities to reduce or manage risk
A tool that sends a copy of all the traffic sent to one switch port to another switch port monitoring and combining traffic from multiple ports to a single port for analysis
A Virtual Private Network (VPN) that only sends traffic intended for systems on the remote trusted network through the VPN tunnel
Also known as text message, a method of sending messages via cellular networks *What does this acronym stand for?
Verticales
The process of selecting alternate options or activities that have less associated risk than the default, common, expedient, or cheap option
An approach to vulnerability scanning that relies on servers rather than local agents
A code-defined visibility infrastructure *What does this acronym stand for?
An attack that occurs when a malicious individual intercepts part of a communication between an authorized user and a resource and then uses a hijacking technique to take over the session and assume the identity of the authorized user
A VPN that connects to networks, rather than connecting a system to a remote network
A biometric factor, which is a behavioral or physiological characteristic that is unique to a subject *The blood vessel pattern at the back of the eyeball is used to establish identity or provide authentication
A port scanner that uses third-party scanners and Open Source Intelligence (OSINT) to gather information
An XML-based language for communication authentication and authorization details between security domains, often over web protocols *Often used to provide a web-based Single Sign-On (SSO) solution *What does this acronym stand for?