My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

R-S Flashcards (4)

Security + SY0-601 Vocabulary List
Horizontales
A violation, or imminent threat of a violation, of a security policy or practice within the organization
The process of identifying the threats and vulnerabilities that exist in the operating environment
An organization's willingness to tolerate risk within the environment
A derivative of platform as a service that provides on-demand online access to specific software applications or suites without the need for local installation (or even local hardware and operating system requirements in many cases) *What does this acronym stand for?
The process used by antivirus software to identify potential virus infections on a system
Written contracts that specify the conditions of services that will be provided by the vendor and the remedies available to the customer if the vendor fails to meet the SLA *What does this acronym stand for?
An approach that quickly summarizes risks and allows senior leaders to quickly focus on the most significant risks facing the organization
A backup of virtual machine
Verticales
An operating environment that divides responsibilities between one or more service providers and the customers' own cybersecurity teams
The rules that are agreed to for a penetration test * These rules are defined before the test starts to ensure that the test does not cause inadvertent harm or go beyond accepted scope *What does this acronym stand for?
An aspect that conducts the scan from a different location on the network, providing a different view into vulnerabilities
A transition environment for code that has successfully cleared testing and is waiting to be deployed into production
A short working session lasting from a few days to a few weeks in the Agile software development methodology
Software programs that have the ability to obtain root-level access and hide certain things from the operating system
The act of subdividing a network into numerous smaller units *These can be used to improve aspects of the network