attack Crossword Puzzles
El Escape Cubano 2022-04-03
kpl 9 2022-05-05
20 Clues: tytär • laiha • hyökätä • selvitä • jatkumo • yhteisö • nokkela • edustaa • voittaa • onneksi • läsnäolo • kampanja • painottaa • yliopisto • valmistua • poliitikko • epävarmuus • tuntematon • laiminlyödä • hermostuneisuus
Antonyms 2023-12-07
Latin hw 2024-04-22
20 Clues: In • Aut • Acer • olim • Levo • Potens • Amitto • Navigo • Contra • Carlin • Integer • Propter • Obtineo • Impetus • Commoveo • Antiquus • Proelium • Facillis • Finitimus • Exercitus
ANTONYMS PART 1 2025-10-26
Vocabualry 2025-12-19
20 Clues: pull • reach • start • skill • yearly • permit • pretty • scared • living • strike • warning • missing • support • respect • antique • recieve • furious • guidance • energetic • conscious
Fire Emblem Engage Emblem Alear Skills 2025-01-27
12 Clues: 10 Unlock • 10 Unlock • 1 Sync Skill • 21 Sync Skill • 20 Sync Skill • 1 Engage Skill • 1 Engage Weapon • 1 Engage Attack • 5 20 Sync Skill • 10 Engage Weapon • 20 Engage Weapon • 1 Engage Attack adjacent
Pearl Habor 2024-05-03
Across
- the legislature of the federal government of the United States
- a state of armed conflict between different nations or states or different groups within a nation or state.
- the people who attack the harbor of hawaii
- A state that the attack happened in
- a sustained fight between large organized armed forces.
- A bomb
- A person who is going into the water
- Something that is flying in the air
Down
- someone who is fighting during serious times
- a harbor in hawaii
- a serious disagreement or argument, typically a protracted one.
- something that takes you through the water
- the country who got attacked by japan
- take aggressive action against (a place or enemy forces) with weapons or armed force, typically in a battle or war.
- When someone stops breathing
- a policy of remaining apart from the affairs or interests of other groups, especially the political affairs of other countries.
16 Clues: A bomb • a harbor in hawaii • When someone stops breathing • A state that the attack happened in • Something that is flying in the air • A person who is going into the water • the country who got attacked by japan • something that takes you through the water • the people who attack the harbor of hawaii • someone who is fighting during serious times • ...
World war II 2023-05-15
Across
- The first bomb attack by the United States on Japan killing 140,000 people
- Passed by US congress because of growing threats
- Where the allies prosecuted German leaders for the crimes they committed during world war II
- Promote the defense of US
- The united states fought for an island from the empire of Japan
- surprise attack by the Japanese on December 7, 1941
- Traveling from one island to another
Down
- The draft
- The code name to develop an atom bomb
- The second bomb attack by the United states on Japan killing 74,000 people
- Naval battle during world war II
- Process of appeasing
- a day in World War II on which Allied forces invaded northern France by means of beach landings in Normandy
- U.S. Supreme Court case concerning the forced relocation and confinement of Japanese Americans
- A battle during world war II
- Helped increase the food production during war
16 Clues: The draft • Process of appeasing • Promote the defense of US • A battle during world war II • Naval battle during world war II • Traveling from one island to another • The code name to develop an atom bomb • Helped increase the food production during war • Passed by US congress because of growing threats • surprise attack by the Japanese on December 7, 1941 • ...
Paper 2 2025-05-22
Across
- Backup type that saves only changed files since the last full backup
- Malicious software designed to damage or gain access to systems
- The act of verifying a user’s identity
- A simulated attack to test system defenses
- Technique used to scramble data to prevent unauthorized access
- Attack that overwhelms a system to make it unavailable
- A social engineering attack that tricks users into giving up credentials
Down
- The physical machines used in digital infrastructure
- Used to simulate hardware environments for testing or development
- Extra layer of login protection using a second device or code
- type that saves only changed files since the last full backup
- Technology that connects devices over short distances wirelessly
- A self-replicating program that spreads without user action
- Virtual or physical environment used for testing
- A fake website designed to steal user data
- Legislation protecting personal data in the UK
16 Clues: The act of verifying a user’s identity • A simulated attack to test system defenses • A fake website designed to steal user data • Legislation protecting personal data in the UK • Virtual or physical environment used for testing • The physical machines used in digital infrastructure • Attack that overwhelms a system to make it unavailable • ...
9/11 2023-05-25
Across
- headquartes of the united states department of defense
- what was the buildings called that got hit by the panes in the city
- leader of the attack
- a person unlawfully hurting civillian's towards politcal aim.
- the month the attack happend
- how many planes was hijacked during 9/11
- who was the vice president during 9/11
Down
- how many law enforcement officers died that day
- what country was responsible for it
- how many planes hit the white house
- a flying vehicle used to travel or transport items
- how many hijackers was there
- who was the president during the 9/11 attack
- someone who is a active resident in a area
- a tramatic experinced from one indivdual and gets flashbacks from that moment later in time
- something hot that burns down stuff and can be put out with water
16 Clues: leader of the attack • how many hijackers was there • the month the attack happend • what country was responsible for it • how many planes hit the white house • who was the vice president during 9/11 • how many planes was hijacked during 9/11 • someone who is a active resident in a area • who was the president during the 9/11 attack • ...
More First Conjugation Verbs 2023-01-31
THE FINAL BATTLE 2023-04-04
20 Clues: río • sol • nunca • final • casco • puente • luchar • ataque • gritar • esperar • batalla • sonrisa • decidir • comenzar • preparar • ejército • relajarse • descansar • perseguir • prisionero
ANTONYMS- a word opposite to another 2021-09-19
kpl 9 2022-05-10
20 Clues: orja • laki • laiha • voima • kohde • jatkaa • oikeus • pahuus • liittyä • hyökätä • yhteisö • kieltää • koulutus • seuraava • nimittää • kaukainen • taistella • poliitikko • laiminlyödä • epätodennäköinen
Kpl 9 2022-05-10
20 Clues: laki • vapaus • pahuus • jatkaa • vaikka • epäily • kirkas • kieltää • uskonto • hyökätä • liittyä • seuraava • nimittää • koulutus • kaukainen • tuntematon • poliittinen • yhteiskunta • laiminlyödä • epätodennäköinen
Module 2 2019-06-06
20 Clues: lis • dym • lina • atak • ważny • hałas • kosić • rondel • słońce • trener • bramka • pranie • oszczep • kwiatek • księżyc • gwizdek • roślina • skręcić • aktorstwo • gimnastyka
Module 2 2019-06-06
20 Clues: dym • lis • atak • lina • kość • kosić • hałas • słońce • trener • rondel • sędzia • kwiatek • księżyc • roślina • skręcić • gwizdek • oszczep • aktorstwo • katastrofa • gimnastyka
Chapter 1 2019-10-20
20 Clues: дно • трюк • много • умный • момент • хорошо • наконец • обещать • бояться • жестокий • отвечать • середина • сердитый • нападать • приезжать • прятаться • охотиться • довольный • безопасный • соглашаться
CFL 8 List 28 Crossword 2024-09-05
Three Girls--I Am Malala--Who Is Malala [Chp. 20] 2022-05-09
Across
- Subject of nightmare
- Malala's 1st exam
- Reason teacher hysterical
- Teacher requests what for prayer
- studies Malala's 2nd exam
- years Length of campaign against Fazlullah
- picture Disturbs Malala's father
Down
- attack Malala's one fear of Taliban
- protection Outcome for prayer recital three times
- protection Outcome for five prayers
- minister Father predicts this about Malala
- Something else Malala does nightly
- Baba Road Route home of Malala's bus
- attack Another of Malala's fear of Taliban
- Amjad Malala's tutor
- al-kursi Common prayer for Malala
- locks Malala does this nightly
17 Clues: Malala's 1st exam • Subject of nightmare • Amjad Malala's tutor • Reason teacher hysterical • studies Malala's 2nd exam • Teacher requests what for prayer • locks Malala does this nightly • Something else Malala does nightly • picture Disturbs Malala's father • al-kursi Common prayer for Malala • protection Outcome for five prayers • ...
Verbs 2016-09-14
vocab synonyms 2021-09-29
20 Clues: fear • meal • kill • cloth • annoy • clear • stupid • hungry • attack • drench • abandon • gigantic • clothing • backwards • immediate • criticize • unskilled • statement • moneymaking • imaginative
Haiwan 2021-03-12
20 Clues: size • nurse • death • carry • health • attack • effect • welfare • routine • disease • neglect • beloved • hardship • treatment • emphasize • important • commitment • nutritious • comfortable • responsibility
U4L2 2022-05-04
20 Clues: φυτό • λύκος • δέρμα • κλαδί • σπηλιά • κυνηγώ • κέρατο • κουνέλι • πολικός • γρασίδι • κουτάβι • σκοτώνω • αρκούδα • χοντρός • ποντίκια • σκίουρος • ρινόκερος • καρχαρίας • χιμπαντζής • επιτίθεμαι
Otsikko 2022-05-10
20 Clues: orja • join • force • laiha • bright • firmly • pahuus • vapaus • pimeys • epäilty • voittaa • distant • neglect • ihminen • hyökätä • kieltää • although • political • yhdistynyt • university
Chapter 1 Vocabulary 2022-08-30
20 Clues: cold • slur • vast • meal • dunk • slay • worry • quick • press • disown • attack • bother • clumsy • paying • hungry • condemn • retreat • clothing • explicitly • resourceful
Stage 5 Vocab 2023-12-07
20 Clues: meus • audio • multī • multa • urbis • senex • turba • curro • adsum • fabula • plaudo • ambulo • puella • petere • clāmor • femina • iuvenis • optimus • agricola • contendo
Kata kerja (verb) 2023-08-23
20 Clues: add • Ask • eat • allow • admit • agree • avoid • answer • attack • arrive • affect • admire • accept • advise • accuse • attend • achieve • approve • believe • accompany
Module 2 2019-06-06
20 Clues: dym • lis • lina • atak • kosić • ważny • hałas • bramka • trener • pranie • rondel • słońce • gwizdek • oszczep • roślina • skręcić • kwiatek • księżyc • aktorstwo • gimnastyka
4basis - Unit 3 2019-11-04
20 Clues: edge • hero • cure • brief • limit • option • reject • attack • tackle • notice • effort • border • prevent • skilled • attempt • heroine • control • progress • discovery • disruption
Vocab puzzle 2020-09-14
20 Clues: Taxi • Stand • Insel • Kunst • Aufzug • zählen • Prozent • Angriff • Bewegung • Befrager • Beispiel • ersetzen • besonders • Milliarde • Stadtteil • Bedingung • Wahrzeichen • Einwanderung • Unabhängigkeit • Unter, inmitten
Ketriini ristsõna 2020-04-02
20 Clues: aju • keha • hull • sõda • fakt • hääl • üksi • õudus • surnud • arenema • ründama • arvamus • pianist • vihkama • tulnukas • komöödia • emotsioon • detektiiv • väljendama • animatsioon
Unidas 4 vocabulario 2025-03-25
Cisco Chapter 3 Vocab! 2023-10-23
Across
- The action of pretending to be someone else to undermine credibility
- Traps a criminal between two sets of doors, where an outer door must close before entering the inner door
- A computer attack that exploits software vulnerabilities that are unknown to the vendor; A fast-moving cyber attack
- A fraud attack that targets high-profile individuals within organizations
- A vulnerability found in web applications that allows criminals to inject scripts into webpages commonly viewed by users; may contain malicious code
- A program that holds a computer captive until the target makes a payment
- Malware that displays pop-ups; comes with Spyware
- A network attack that builds a network of botnets, which are infected users, to overwhelm the network with requests, rendering it unavailable
- Executable code attached to another executable file, usually a legitimate application; requires a host application
- An attack where criminals intercept a network by gaining the encryption key to analyze the network
- Add-ons to browsers that display content developed for the appropriate software
- A form of fraud where an attacker steals credentials by acting as a reputable source
- A form of fraud using text messaging to impersonate legitimate sources
- An impersonation attack that takes advantage of a trusted relationship between two systems, such as the acceptance of authentication; comes in various forms, such as MAC and IP addresses
- Attacks made to boost malicious sites to rank higher in search results
- An attack that exploits the weaknesses in a program, such as not validating databases properly
- A program, or code, that bypasses the normal authentication of a device
- Impersonation of legitimate websites to deceive users into entering sensitive credentials.
Down
- The disruption of the transmission of a radio station so that the signal sent never reaches the receiving stations
- Attacks that manipulate individuals into performing actions to benefit the attacker or giving sensitive information; A non-technical means of gathering information
- A program that uses a trigger, such as dates, times, or programs, to activate
- The process of going through a target’s trash to obtain information that is thrown out
- An event that occurs when data goes beyond the limits of a buffer, which could lead to system crashes, loss of privileges, or data compromise
- A form of fraud where customized emails are sent to specific individuals
- The act of intercepting communications between computers to steal information, or manipulate messages crossing the network.
- A type of network attack that results in the interruption of services to devices; Makes the network unavailable
- A method in which criminals observe,or pay close attention to a victim to pick up sensitive information
- The sending of unauthorized messages to another Bluetooth device
- Pop-up windows that persuade the user to act based on fear
- A document that specifies practices that must be agreed upon before gaining access to a network
- A program that tracks the keystrokes of a user on the system; Can be malicious and legitimate
- A program that exploits vulnerabilities and performs privilege escalation; Used to create backdoors
- A wireless access point that can be installed on a secure network without authorization to pose a risk; Used as a setup for MitM attacks
- Malware that alters a computer browser’s settings to redirect users to malicious websites; installed without permission
- Software created to disrupt computer operations or gain access without permissions
- An attack that allows a criminal to execute any command on a target machine after taking advantage of a vulnerability
- A person tags along with authorized individuals for access to a restricted area
- Code that replicates itself independently; slows down networks
- Unsolicited mail containing harmful links, malware, or deceptive content
- Applications that act in an undesirable manner, whether there is malware within it or not; Can still pose a risk
- An attack where the victim’s information, such as contacts, is copied by an attacker through the use of Bluetooth
- Malware that carries out operations through the disguise of a legitimate-looking file
- An act of deceiving or tricking someone; elicits a user reaction
- A form of fraud where the attackers use spoof calls from legitimate sources
- An attacker examines all the network traffic as it passes through various Network cards on devices, regardless of whether it was addressed to them.
- Software that tracks a user’s computer activities
46 Clues: Malware that displays pop-ups; comes with Spyware • Software that tracks a user’s computer activities • Pop-up windows that persuade the user to act based on fear • Code that replicates itself independently; slows down networks • The sending of unauthorized messages to another Bluetooth device • An act of deceiving or tricking someone; elicits a user reaction • ...
World War II 2022-02-11
Across
- One who started WW2
- Beeping thing in Airplane
- Japanese attack on US
- US attack on Japan
- Big car shooting explosives
- Good Side
- First name, Last Name: Churchhill
Down
- USS Battleship that starts with an A
- Event where Jews were killed
- Beach invasion
- President of United States
- Place where US dropped bomb
- Bad Side
13 Clues: Bad Side • Good Side • Beach invasion • US attack on Japan • One who started WW2 • Japanese attack on US • Beeping thing in Airplane • President of United States • Place where US dropped bomb • Big car shooting explosives • Event where Jews were killed • First name, Last Name: Churchhill • USS Battleship that starts with an A
Attack on Baltimore 2024-04-10
8 Clues: sewing • dangerous • impressively • a type of cannon • an important song • the wall of a fort • a high-ranking officer in the military • deep water near land, where ships can safely put down their anchors
Asthma Crossword 2012-11-27
Across
- excessive amounts of this may lead to hyperventilation
- Name for a substance that triggers an asthma attack (ex. pet dander)
- One type of medication for asthma (inhaled _________)
- another word for consequences, risks, and ramifications
- one of the substances that mast cells release
- _________ asthma: caused by exercise
Down
- _______ asthma: caused by allergens
- Name of a short-term beta2 agonist
- shares triggers with asthma and is known to make an asthma attack worse
- another name for narrowing of the bronchiole
- part of airway that constricts during an asthma attack
- sometimes a predicator of asthma and can be controlled by healthy diet and exercise
- One in ________ adults have asthma
- exercise will make the respiratory muscles stronger, making breathlessness less perceptive
- increases the person's VO2max, which in turn increase size and strength
- or gastroesophageal reflux, include symptoms such as chest pain, heartburn, cough, and hoarseness
16 Clues: Name of a short-term beta2 agonist • One in ________ adults have asthma • _______ asthma: caused by allergens • _________ asthma: caused by exercise • another name for narrowing of the bronchiole • one of the substances that mast cells release • One type of medication for asthma (inhaled _________) • excessive amounts of this may lead to hyperventilation • ...
World War 2 2020-12-17
Across
- power union of german italy and japan
- harbor attack attack in whick jappan attack USA
- Churchill leader of grear britain
- Army of german
- 3d Reich of German
Down
- forces union of USA Great Britain, etc
- technique of digging in the ground
- Mussolini Leader of italy
- kin of people nazis search for kill
- S truman last leader of usa in the war
10 Clues: Army of german • 3d Reich of German • Mussolini Leader of italy • Churchill leader of grear britain • technique of digging in the ground • kin of people nazis search for kill • power union of german italy and japan • forces union of USA Great Britain, etc • S truman last leader of usa in the war • harbor attack attack in whick jappan attack USA
Security 2023-03-28
Across
- - A network segment that is not part of an organization's internal network, but is still accessible from the internet.
- - The practice of secure communication in the presence of third parties.
- - A security algorithm for wireless networks.
- - A protocol suite for securing Internet Protocol (IP) communications.
- - A global network of interconnected computer networks.
- - A group of computers and other devices that are connected together to share resources and information.
- - A method of transferring data securely across an untrusted network, by encapsulating data
Down
- - A type of cyber attack in which multiple compromised systems attack a target,.
- - The study of analyzing and breaking encryption systems.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - A network of compromised computers that can be used to perform malicious activities.
- - A type of DDoS attack that floods a victim with ICMP echo request packets.
- - A protocol used in IPSec to provide confidentiality, integrity, and authenticity for IP packets.
- - A type of DDoS attack that uses long-form field input to overwhelm the target server.
14 Clues: - A security algorithm for wireless networks. • - A global network of interconnected computer networks. • - The study of analyzing and breaking encryption systems. • - A protocol suite for securing Internet Protocol (IP) communications. • - The practice of secure communication in the presence of third parties. • ...
kevin 2021-10-05
Across
- an indiscriminate and brutal slaughter of people
- to attack a place continuously with bombs, shells, or missiles
- a territory that became five states in today's Midwest
- going about in search of things to steal or people to attack
- angular distance of a place north or south of the equator
Down
- to be forced to leave a place and never return
- to make an attack or assault in return for a similar attack
- area of land tenure governed by a federally recognized native tribe
- without the basic necessities of life
- to chain someone up with shackles
10 Clues: to chain someone up with shackles • without the basic necessities of life • to be forced to leave a place and never return • an indiscriminate and brutal slaughter of people • a territory that became five states in today's Midwest • angular distance of a place north or south of the equator • to make an attack or assault in return for a similar attack • ...
kevin 2021-10-05
Across
- to chain someone up with shackles
- to attack a place continuously with bombs, shells, or missiles
- area of land tenure governed by a federally recognized native tribe
- without the basic necessities of life
- to make an attack or assault in return for a similar attack
Down
- angular distance of a place north or south of the equator
- to be forced to leave a place and never return
- a territory that became five states in today's Midwest
- going about in search of things to steal or people to attack
- an indiscriminate and brutal slaughter of people
10 Clues: to chain someone up with shackles • without the basic necessities of life • to be forced to leave a place and never return • an indiscriminate and brutal slaughter of people • a territory that became five states in today's Midwest • angular distance of a place north or south of the equator • to make an attack or assault in return for a similar attack • ...
kevin 2021-10-05
Across
- to chain someone up with shackles
- to attack a place continuously with bombs, shells, or missiles
- area of land tenure governed by a federally recognized native tribe
- without the basic necessities of life
- to make an attack or assault in return for a similar attack
Down
- angular distance of a place north or south of the equator
- to be forced to leave a place and never return
- a territory that became five states in today's Midwest
- going about in search of things to steal or people to attack
- an indiscriminate and brutal slaughter of people
10 Clues: to chain someone up with shackles • without the basic necessities of life • to be forced to leave a place and never return • an indiscriminate and brutal slaughter of people • a territory that became five states in today's Midwest • angular distance of a place north or south of the equator • to make an attack or assault in return for a similar attack • ...
CrossWord 2024-11-15
Across
- The art of disguising messages (11 letters)
- Testing a system’s defenses by simulating attacks (11 letters)
- A weakness that could allow an attacker to exploit a system (12 letters)
- Authentication method requiring two forms of verification (9 letters)
- Attack where attacker pretends to be a trusted entity (7 letters)
- Unauthorized entry into a system or network (7 letters)
- Unintentional or intentional access to sensitive data (7 letters)
- Malicious program that spreads across computers (5 letters)
- Software used to monitor and control network traffic (9 letters)
- Process of verifying identity (13 letters)
Down
- Hidden software used to maintain access on a system (8 letters)
- Converts plain text into an unreadable format (9 letters)
- A program designed to replicate itself and spread (5 letters)
- Type of cyber-attack where access is blocked until ransom is paid (9 letters)
- Technique to gain sensitive information through social interaction (10 letters)
- of attack where users are overwhelmed with traffic (7 letters)
- Protects against unauthorized access to data
- Unauthorized access or control over a system (4 letters)
- A harmful software disguised as legitimate
19 Clues: Process of verifying identity (13 letters) • A harmful software disguised as legitimate • The art of disguising messages (11 letters) • Protects against unauthorized access to data • Unauthorized entry into a system or network (7 letters) • Unauthorized access or control over a system (4 letters) • Converts plain text into an unreadable format (9 letters) • ...
Art Attack 2 2022-03-10
8 Clues: show, exhibition • emotion, feeling • great personal charm • difficult to describe • distance down or across • to make clear or intelligible • to call up feelings or memories • to serve as a typical example of
attack -1 n. 2023-02-17
Across
- [C] a rapid, powerful military attack, especially by aircraft
- [C, U] the act of an army entering another country by force in order to take control of it
- [C] an attack on a place in order to take control of it
Down
- [U] a violent attack or threats by one country against another
- [C] a planned series of military attacks which sometimes take place over a long period of time
- [C] a short surprise attack on the enemy by soldiers, ships or aircraft
- [C] (formal) a sudden, temporary entry into a place controlled by the enemy, especially across a border
- [C, U] (in a war) an aggressive attempt to hurt or defeat the enemy using weapons and violence
8 Clues: [C] an attack on a place in order to take control of it • [C] a rapid, powerful military attack, especially by aircraft • [U] a violent attack or threats by one country against another • [C] a short surprise attack on the enemy by soldiers, ships or aircraft • [C, U] the act of an army entering another country by force in order to take control of it • ...
Search And Destroy 2022-08-20
Across
- words or actions out of hostility
- type of aircraft used in war and commercially
- left something usally on bad terms
- set of commands to do
- if theres not a lot of info on it its ____
- similar to a mission
- to withdraw troops of supplies
- another name for a soldier
Down
- surprise attack
- lots in jungle
- Main character of book
- series of events that are memorable
- haven't made a decison
- solid area or surface on earth
- place where injuries and wounds are healed
- outdoor living area
- parents and siblings
- type of weapon used in war
18 Clues: lots in jungle • surprise attack • outdoor living area • parents and siblings • similar to a mission • set of commands to do • Main character of book • haven't made a decison • type of weapon used in war • another name for a soldier • solid area or surface on earth • to withdraw troops of supplies • words or actions out of hostility • left something usally on bad terms • ...
Information Security - Crossword 2024-03-25
Across
- A security protocol that provides secure communication over a network, often used for remote access
- A type of authentication that verifies a user's identity based on physical characteristics
- A security measure that restricts access based on the principle of least privilege
- A cryptographic key that is kept secret and used for decrypting data
- A protocol used to secure email communication
- A program or device that identifies and authenticates a user's identity electronically
- An attack that involves intercepting and altering communication between two parties
- A method of encrypting data that uses a single key for both encryption and decryption
Down
- The act of tricking individuals into revealing sensitive information
- A type of attack that uses social engineering to manipulate individuals into taking specific actions
- A type of malware that hides its presence and can perform malicious actions without user knowledge
- A type of attack that floods a system with excessive traffic to disrupt normal operation
- A security incident response plan to restore systems and operations after an attack
- A technique used to ensure data integrity by creating a unique hash value for a file
- Software used to detect and prevent unauthorized access to a computer network
15 Clues: A protocol used to secure email communication • The act of tricking individuals into revealing sensitive information • A cryptographic key that is kept secret and used for decrypting data • Software used to detect and prevent unauthorized access to a computer network • A security measure that restricts access based on the principle of least privilege • ...
Security CrossWord 2014-03-28
Across
- Who use their dexterity/proficiency explicitly for vicious ends like compromising the application and getting confidential data with viruses or phishing
- A program/attack used by which the cracked/attacked part of network is inoperable
- The Secure layer before executing any request that performs Request, Parameter, Header and cookie size checks in CITI related applications
- A harmful software program in disguise
- The Security Filter developed by CITI to validate the request parameters to mach predefined regex patterns
- Anti-Automation Security that was implemented across CITI applications to prevent Denial Of Service attack.
- If this technique is implemented the rainbow tables which are generally created by hackers cannot be created before the attack
Down
- A set of machines that have been trapped by a virus, worm etc., and placed under the control of one or more
- URL when added in this list can bypass all the Enforcement filters.
- The Security feature developed by CITI that validates the threshold limits for actions by having a centralized/distributed monitoring on each JVM
- Cryptographic transformation of data results in ________ text
- Attack where the cyber attackers specifically targets for less number of individuals or to specific groups
- Attack through which the system gets compromised by trying only a possible set of passwords
13 Clues: A harmful software program in disguise • Cryptographic transformation of data results in ________ text • URL when added in this list can bypass all the Enforcement filters. • A program/attack used by which the cracked/attacked part of network is inoperable • Attack through which the system gets compromised by trying only a possible set of passwords • ...
Angina & Heart Attack 2013-04-27
Across
- Angina and heart attack are caused by cardiovascular _______
- Angina pain usually disappears with ____
- Medication used to decrease workload of the heart
Down
- Angina is a _______ block of an artery supplying the heart
- Medication used to prevent further clot formation
- Angina pain usually lasts ____ than 10mins
- Heart attack is a _____ blockage of an artery supplying the heart
- Heart attack pain usually lasts _______ than 10mins
8 Clues: Angina pain usually disappears with ____ • Angina pain usually lasts ____ than 10mins • Medication used to prevent further clot formation • Medication used to decrease workload of the heart • Heart attack pain usually lasts _______ than 10mins • Angina is a _______ block of an artery supplying the heart • Angina and heart attack are caused by cardiovascular _______ • ...
attack on titan 2021-02-25
8 Clues: obsessed with titans • who is the jaw titan? • who has a moustache in s4 • who is crystallised in s1 • who is the main character • who betrayed everyone in s2 • who is Eren's adopted sister • Humanity's strongest soldier
The hammer attack 2025-01-14
8 Clues: blow standard • break in to pieces • to come to face to face with • to bring back to life or spirit • the act of responding or reaction • a period of decline;the receding tide • an expression of dissatisfaction or resentment • the act of seeking or pursuing something; a search.
The Outsiders 2024-11-07
Across
- – Something Johnny endures from his father, showing his troubled home life.
- – A tough Greaser who shows a softer side when he sees Johnny hurt.
- – The type of car the Socs drove, symbolizing their wealth and power.
- – The narrator who starts to see similarities between the Socs and Greasers.
- – Johnny would carry this as a lifelong reminder of the attack.
- – Soc girl who befriends Ponyboy and shares that “things are rough all over.”
- – Fights between the Greasers and Socs, often escalating their rivalry.
Down
- – Johnny started carrying this for protection after his traumatic experience.
- – A common way for the Greasers and Socs to resolve their conflicts, often resulting in violence.
- – Character who was deeply traumatized by an attack from the Socs.
- – An intense feeling Johnny experienced after his attack, leading to lasting trauma.
- – Symbol of the violent conflict; Johnny’s shirt was splattered with this after the attack.
- – The group of friends from the East Side known for their loyalty and tough exterior.
- – The wealthier group from the West Side who bully the Greasers.
14 Clues: – Johnny would carry this as a lifelong reminder of the attack. • – The wealthier group from the West Side who bully the Greasers. • – Character who was deeply traumatized by an attack from the Socs. • – A tough Greaser who shows a softer side when he sees Johnny hurt. • – The type of car the Socs drove, symbolizing their wealth and power. • ...
Security 2023-03-28
Across
- - The practice of secure communication in the presence of third parties.
- - A type of DDoS attack that uses long-form field input to overwhelm the target server.
- - A network segment that is not part of an organization's internal network, but is still accessible from the internet.
- - A group of computers and other devices that are connected together to share resources and information.
- - A network of compromised computers that can be used to perform malicious activities.
- - A method of transferring data securely across an untrusted network, by encapsulating data
- - A protocol suite for securing Internet Protocol (IP) communications.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - A protocol used in IPSec to provide confidentiality, integrity, and authenticity for IP packets.
Down
- - The study of analyzing and breaking encryption systems.
- - A type of cyber attack in which multiple compromised systems attack a target,.
- - A type of DDoS attack that floods a victim with ICMP echo request packets.
- - A global network of interconnected computer networks.
- - A security algorithm for wireless networks.
14 Clues: - A security algorithm for wireless networks. • - A global network of interconnected computer networks. • - The study of analyzing and breaking encryption systems. • - A protocol suite for securing Internet Protocol (IP) communications. • - The practice of secure communication in the presence of third parties. • ...
6.1 2021-11-30
Guess what! 2013-11-13
19 Clues: Less • Even • Move • Male • Solve • Truth • Future • Danger • Victim • Attack • Single • Office • Sister • Parents • Shouted • Remember • Difficult • Dangerous • Shoplifter
Criminal Law 2015-01-29
Across
- ศาลฎีกา
- ค่าปรับ
- การกักขัง
- อันตรายทางด้านจิตใจ
- การปล้นที่มีผู้กระทำมากกว่าสามคนขึ้นไป
- ทำร้ายร่างกาย
- การกระทำผิดกฎหมายโดยเตนา
- การฆาตกรรม
- เยาวชน
- ศาลอุทธรณ์
Down
- การประหารชีวิต
- การใช้กำลัง
- การขโมยโดยใช้กำลังและอาวุธ
- การกระทำผิดกฎหมายโดยไม่เจตนา
- การกระทำผิดกฎหมายโดยประมาท
- อันตรายทางด้านจิตใจ
- อาวุธ
- การกระทำที่ผิดกฎหมาย
- ทรัพย์สิน
- ศาลชั้นต้น
20 Clues: อาวุธ • เยาวชน • ศาลฎีกา • ค่าปรับ • การกักขัง • ทรัพย์สิน • ศาลชั้นต้น • การฆาตกรรม • ศาลอุทธรณ์ • การใช้กำลัง • ทำร้ายร่างกาย • การประหารชีวิต • อันตรายทางด้านจิตใจ • อันตรายทางด้านจิตใจ • การกระทำที่ผิดกฎหมาย • การกระทำผิดกฎหมายโดยเตนา • การขโมยโดยใช้กำลังและอาวุธ • การกระทำผิดกฎหมายโดยประมาท • การกระทำผิดกฎหมายโดยไม่เจตนา • การปล้นที่มีผู้กระทำมากกว่าสามคนขึ้นไป
4kader - Unit 3 2019-11-04
19 Clues: save • cope • crew • brief • profit • insist • attack • tackle • rescue • attract • despite • skilled • control • journey • heroine • opposite • scientist • intention • fulfilling
spanish terms 2023-05-03
unit 9 2023-08-02
20 Clues: deny • evil • right • human • fight • united • forbid • target • attack • leader • survive • freedom • although • continue • sensitive • immigrant • represent • following • emphasize • fortunately
Schools in the past BLOGGERS 1 2021-09-22
19 Clues: írni • trón • tart • ókori • drága • görög • házas • szünet • vessző • alapít • tanult • terület • egyetem • szigorú • mérföld • magolni • megtámad • mindemellett • barátságtalan
Latin II Pyrrhus of Epirus 2024-04-18
19 Clues: in • acer • levo • olim • contra • potens • caelum • autaut • navigo • amitto • impetus • integer • obtineo • propter • facilis • fintimus • proelium • commoveo • exercitus
โรคในผู้สูงอายุ 2025-07-15
20 Clues: DM • acute • palsy • attack • stroke • insulin • hypoxia • rupture • chronic • aneurysm • Arrhythmia • thrombosis • hemorrhage • Infarction • hypoglycemia • PANCREATITIS • hypertension • Dyslipidemia • hypoglycemia • eccocardiogram
Cross words22 2021-07-18
Across
- Used by computers to solve problems
- Type of malware attack
- Home for servers
- Method to covert data into more secure form
- Collection of data
- Part of Cloud computing
- Known for all unauthorized activities
- An ecosystem to solve real life problem
- A fraud practice to send email
- Mostly a part of mail
Down
- Occurrence of unusual event
- A way of reducing manual tasks
- A way of working in Corporate world
- Activity which is frequent done by our Team
- Part of network Security
- Block chain technology
- Methodology to improve work
- Legacy of fresco family
- Counter attack to unauthorized use of system
19 Clues: Home for servers • Collection of data • Mostly a part of mail • Type of malware attack • Block chain technology • Legacy of fresco family • Part of Cloud computing • Part of network Security • Occurrence of unusual event • Methodology to improve work • A way of reducing manual tasks • A fraud practice to send email • Used by computers to solve problems • ...
viruses 2018-11-16
Across
- virus file spread through ichat instant messaging. The file is called “latestpics.tgz”. The user should open the compressed file and open the executable inside the compressed file.
- the machines, wiring, and other physical components of a computer or other electronic system.
- counter to a virus
- a person who uses computers to gain unauthorized access to data
- a distributed denial-of-service (DDoS) attack is a malicious attempt to bring down networks
- nitiated a distributed denial of service (DDoS) attack on the White House.
- pretends to be something else but is still a virus
- Many computer networks were unprepared for the attack, and as a result the virus brought down several important systems. The Bank of America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors.
- One trigger caused the virus to begin a denial of service (DoS) attack starting Feb. 1, 2004. The second trigger commanded the virus to stop distributing itself on Feb. 12, 2004. Even after the virus stopped spreading, the backdoors created during the initial infections remained active [source: Symantec].
- a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- according to TruSecure CTO Peter Tippett,it only took 22 minutes for this attack to be at the top of most reported attacks
Down
- messages distributed by electronic means from one computer user to one or more recipients via a network:
- the programs and other operating information used by a computer:
- ttacked computers through a Microsoft Windows vulnerability. Unlike other worms, it didn't spread through e-mail. Instead, once the virus infected a computer, it looked for other vulnerable systems. It contacted those systems and instructed
- when someone send you a eamail asking for personal info
- Once activated, the virus replicates itself and sends itself out to the top 50 people in the recipient's e-mail address book.
- is a Trojan horse program. Its payload is another program, though not always the same one. Some versions of the Storm Worm turn computers into zombies or bots. As computers become infected, they become vulnerable to remote control by the person behind the attack.
- infected a victim's computer through an e-mail message, replicated itself and then sent itself to people in the victim's address book.
- virus initially traveled the Internet by e-mail, just like the Melissa virus.
19 Clues: counter to a virus • pretends to be something else but is still a virus • when someone send you a eamail asking for personal info • a person who uses computers to gain unauthorized access to data • the programs and other operating information used by a computer: • nitiated a distributed denial of service (DDoS) attack on the White House. • ...
chapter 7 2021-10-06
Across
- an area of land set aside for occupation by North American Indians.
- going about in search of things to steal or people to attack.
- a person who lives away from their native country, either from choice or compulsion.
- the land between the Great lakes,Mississippi and the Ohio river
- an indiscriminate and brutal slaughter of people.
Down
- chain with shackles
- attack continuously with bomb,shells, or other missiles
- make a attack or assault in return of a similar attack
- regions, especially with reference to their temperature and distance from the equator
- without the basic necessities of life
10 Clues: chain with shackles • without the basic necessities of life • an indiscriminate and brutal slaughter of people. • make a attack or assault in return of a similar attack • attack continuously with bomb,shells, or other missiles • going about in search of things to steal or people to attack. • the land between the Great lakes,Mississippi and the Ohio river • ...
antonyms 2021-09-09
19 Clues: sad • thin • sink • slow • short • Depart • Guilty • scared • excited • - Sharp • - Solid • subtract • multiply • - Cloudy • - Defend • difficult • - Terrible • interesting • Complicated
4K - Unit 3 2025-01-27
20 Clues: cope • save • crew • brief • limit • attack • rescue • profit • tackle • insist • control • attract • despite • skilled • journey • heroine • opposite • intention • scientist • fulfilling
#InfraNet Cyber Awareness 2022-10-13
Across
- Security or house
- Password attack method
- Doesn'trequire a host file to replicate itself
- This horse can stampede your security defenses
- Who is responsible for cybersecurity
- Verifying identity
- Unauthorized access to a network
- Scrambling text into an unreadable format
- Similar to a password
Down
- Any crime committed electronically
- Watches where you go on the internet
- Multi-factor authentication
- Cyber awareness month
- Wireless technology using short-wave UHF radio waves
- Attack attempt to acquire personal information
- Prevents unauthorized access to or from a private network
- The address of a webpage
- Program that is designed to automate tasks
- Chief information security officer
19 Clues: Security or house • Verifying identity • Cyber awareness month • Similar to a password • Password attack method • The address of a webpage • Multi-factor authentication • Unauthorized access to a network • Any crime committed electronically • Chief information security officer • Watches where you go on the internet • Who is responsible for cybersecurity • ...
Cross words 2021-07-18
Across
- Part of Cloud computing
- Occurrence of unusual event
- A way of working in Corporate world
- Methodology to improve work
- Type of malware attack
- Counter attack to unauthorized use of systems
- Block chain technology
- Legacy of fresco family
- Used by computers to solve problems
Down
- Collection of data
- Home for servers
- A fraud practice to send email
- Mostly a part of mail
- Method to covert data into more secure form
- An ecosystem to solve real life problem
- Known for all unauthorized activities
- Activity which is frequent done by our Team
- Part of network Security
- Smart way of reducing manual tasks
19 Clues: Home for servers • Collection of data • Mostly a part of mail • Type of malware attack • Block chain technology • Part of Cloud computing • Legacy of fresco family • Part of network Security • Occurrence of unusual event • Methodology to improve work • A fraud practice to send email • Smart way of reducing manual tasks • A way of working in Corporate world • ...
Cross words1 2021-07-18
Across
- Part of Cloud computing
- Occurrence of unusual event
- A way of working in Corporate world
- Methodology to improve work
- Type of malware attack
- Counter attack to unauthorized use of system
- Block chain technology
- Legacy of fresco family
- Used by computers to solve problems
Down
- Collection of data
- Home for servers
- A fraud practice to send email
- Mostly a part of mail
- Method to covert data into more secure form
- An ecosystem to solve real life problem
- Known for all unauthorized activities
- Activity which is frequent done by our Team
- Part of network Security
- Smart way of reducing manual tasks
19 Clues: Home for servers • Collection of data • Mostly a part of mail • Type of malware attack • Block chain technology • Part of Cloud computing • Legacy of fresco family • Part of network Security • Occurrence of unusual event • Methodology to improve work • A fraud practice to send email • Smart way of reducing manual tasks • A way of working in Corporate world • ...
Extra crossword 2016-03-14
19 Clues: aap • tam • hek • leeuw • veilig • kennis • geweer • eiland • niemand • ontbijt • aanraken • vanavond • werkelijk • overslaan • ondeugend • overleven • aanvallen • herstellen • ongemakkelijk
Nonas - No Better Friend 2020-03-27
19 Clues: lack • turn • noise • climb • ships • shore • dirty • dress • sneak • entire • attack • murmur • satisfy • missile • solidify • continue • oppressed • corrosion • threatening
9th grade Unit 2 2025-01-16
19 Clues: kmen • věrný • drbat • tajně • soucit • popsat • soudit • dovolit • podrbat • sobecký • zlepšit • lidstvo • zrcadlit • zaútočit • nečestný • společník • rozmazlit • bratrstvo • tvrdohlavý
Latin 4 2025-02-28
21 Clues: do • via • sto • capio • deleo • facio • cupio • moneo • pugno • maneo • iubeo • notus • venio • iacio • venio • clarus • incola • festino • oppugno • aedifico • appropinquo
4basis Unit 3 2018-11-06
19 Clues: cure • area • crew • hero • cope • save • effort • attack • option • reject • create • threat • control • breathe • heroine • skilled • distance • graduate • intention
ronin ristikko 2022-05-05
19 Clues: lupa • takka • laiha • pahuus • epäily • liittyä • hyökätä • johtaja • yhteisö • tiukasti • koulutus • läsnäolo • valmistua • yliopisto • tuntematon • hän_syntyi • maahanmuuttaja • talibaani_liike • epätodennäköinen
Globalization 2023-04-15
19 Clues: Help • Rags • Award • Online • Attack • Living • Global • Ability • Fairness • Increase • Exchange • Discovery • Companies • Employment • Businesses • Advantages • Responsible • Surrounding • Conversation
Long QT 2025-02-27
Across
- treatment for LQTS between beta blockers and ICD
- feature of T-waves in LQT1
- polymorphic vt caused by LQTS where QRS "twist" around the isolectric line
- feature of T-waves in LQT2
- classic presentation of attack for LQT1
- primary liquid treatment used for arrhythmia prevention in lqts
- classic presentation of attack for LQT3
Down
- feature of T-waves in LQT3
- name of criteria for LQTS
- percent of patients we find known gene defects for
- classic presentation of attack for LQT2
11 Clues: name of criteria for LQTS • feature of T-waves in LQT3 • feature of T-waves in LQT1 • feature of T-waves in LQT2 • classic presentation of attack for LQT1 • classic presentation of attack for LQT2 • classic presentation of attack for LQT3 • treatment for LQTS between beta blockers and ICD • percent of patients we find known gene defects for • ...
Cyber CYber 2024-10-07
Across
- KEY INFRASTRUCTURE What framework manages digital certificates and public-key encryption?
- What acronym refers to a security operations center responsible for monitoring and analyzing security incidents?
- VULNERABILITY What do you call a programming flaw that can be exploited by attackers?
- RECOVERY What term describes a strategy for recovering from a cyber incident?
- A security measure that helps prevent unauthorized access to a network?
- WEB What term refers to the part of the internet that is not indexed by traditional search engines?
- What type of software is potentially unwanted and often bundled with legitimate software?
- What type of malware allows remote access to a user's device?
- What term refers to a security incident where sensitive data is accessed without authorization?
- DETECTION A tool or process for detecting unauthorized access to a system?
- A type of cyber attack where the attacker impersonates a legitimate user?
- TESTING A systematic examination of a system for security weaknesses?
- What term describes malicious code that appears legitimate?
- What term is used for a password that is difficult to guess?
- Which type of attack sends a flood of traffic to overwhelm a network?
- THEFT The unauthorized use of someone's personal data is known as?
- FLOOD What type of DDoS attack exploits the TCP handshake process?
- What type of encryption uses two different keys for encryption and decryption?
- The practice of obtaining sensitive information by deception is known as?
- What type of cryptographic attack tries all possible combinations of keys?
Down
- A method used to authenticate users based on physical characteristics?
- What do you call a security measure that uses two or more methods to verify identity?
- A series of steps taken to ensure the security of information systems?
- The information that is collected to assess vulnerabilities?
- SCANNING What is a method for identifying weaknesses in a system’s security?
- What is the process of converting plaintext into ciphertext?
- What type of software is designed to disrupt, damage, or gain unauthorized access to computer systems?
- A malicious user who seeks to exploit system vulnerabilities?
- The act of attempting to steal data through exploiting weak points?
- What refers to the principle of least privilege in cybersecurity?
- What technique uses social interactions to manipulate individuals into giving up confidential information?
- What type of malware can replicate itself and spread to other computers?
- The process of decoding information or data that has been encrypted?
- What is a security resource whose value lies in being probed, attacked, or compromised?
- A collection of related data that may be exposed during a breach is called?
- SCRIPTING What is the type of attack that injects malicious scripts into webpages viewed by users?
- ATTACK A planned attack to capture sensitive information over a network?
- IDS What term refers to a system that captures and stores network traffic?
- TOKEN What is a deceptive marker used to detect unauthorized access or data leaks?
- A malicious email that pretends to be from a trustworthy source?
40 Clues: What term describes malicious code that appears legitimate? • The information that is collected to assess vulnerabilities? • What is the process of converting plaintext into ciphertext? • What term is used for a password that is difficult to guess? • A malicious user who seeks to exploit system vulnerabilities? • ...
Cross words 2021-07-18
Across
- mostly a part of mail
- Part of Cloud computing
- Block chain technology
- Methodology to improve work
- A fraud practice to send email
- Legacy of fresco family
- Home for servers
- Collection of data
- A way of working in Corporate world
- occurrence of unusual event
- used by computers to solve problems
Down
- Part of network Security
- Method covert data into more secure frm
- An ecosystem to solve real life problem
- Type of malware attack
- Activity which is frequent done by Team
- smart way of reducing manual tasks
- Known for all unauthorized activities
- Counter attack to unauthorized use of sys
19 Clues: Home for servers • Collection of data • mostly a part of mail • Type of malware attack • Block chain technology • Part of Cloud computing • Legacy of fresco family • Part of network Security • Methodology to improve work • occurrence of unusual event • A fraud practice to send email • smart way of reducing manual tasks • A way of working in Corporate world • ...
Week 3 Unit Vocabulary/KLW 2020-09-03
Across
- to stop short and refuse to proceed
- to make amends
- a group of animals; and assemblage
- to make or become greater
- any overwhelming attack as of words or blows
- something left to someone in a will
- military supplies and weapons
- a small, inexpensive trinket
- a gradual reduction or weakening
- to attribute to a specific cause
Down
- lacking floavor or zest; dull
- to attack violently
- being in a state of intellectual darkness, ignorance
- threatening, hurtful
- to soothe, to pacify
- a place or scene of noisy uproar and confusion
- the highest peak point
- sill, stupid
- the unlawful beating of a person
19 Clues: sill, stupid • to make amends • to attack violently • threatening, hurtful • to soothe, to pacify • the highest peak point • to make or become greater • a small, inexpensive trinket • lacking floavor or zest; dull • military supplies and weapons • the unlawful beating of a person • a gradual reduction or weakening • to attribute to a specific cause • a group of animals; and assemblage • ...
BPB 2023-03-14
Across
- The best instructor of BPB.
- Freedom from attack and Freedom to attack.(two words)
- The foundation of our Profession of Arms.
- what great leader start off as.
- Motivating, influencing, and directing personnel.
- Enable cross-utiliization training to support Agile Combat Employment.
- Semper Fidelis.
- Connect our families with our units.
- Honesty, Courage, Accountability, Humility.
Down
- Transform a climate of corrosion into a climate of ethical commitment. (two words)
- Noncommissioned Officers.
- The obligation to preform.
- Upholding the highest standards.
- Career broadening roles.
- A mindset.
- You Are Never Forgotten.
- This We'll Defend
- A tradition of honor, and a legacy of valor.
- Do solemnly swear.
19 Clues: A mindset. • Semper Fidelis. • This We'll Defend • Do solemnly swear. • Career broadening roles. • You Are Never Forgotten. • Noncommissioned Officers. • The obligation to preform. • The best instructor of BPB. • what great leader start off as. • Upholding the highest standards. • Connect our families with our units. • The foundation of our Profession of Arms. • ...
Virus Crossword Jason Milgate 2019-11-05
Across
- a virus that replicates itself to spread to other computers
- a bad computer program designed to attack software
- scams that look real but try to bait you into getting scammed
- programs that your computer runs
- the act of using a computer to gain unauthorized access to data
- a download that takes place without your consent on a website
- a data storage device that can be plugged into any computer with a USB port
- electronic mail
Down
- a distributed denial of service attack
- a virus that encrypts your data and forces you to pay money to get it back
- a virus disguised as legitimate software
- coding information so that it cannot be accessed
- software designed to do bad things
- a virus spread through email that overwrote your information
- the first virus to attack hardware
15 Clues: electronic mail • programs that your computer runs • software designed to do bad things • the first virus to attack hardware • a distributed denial of service attack • a virus disguised as legitimate software • coding information so that it cannot be accessed • a bad computer program designed to attack software • a virus that replicates itself to spread to other computers • ...
9/11 attacks 2025-05-02
Across
- How many Planes they used for the attack
- What day It was the attack
- The tower that it was attacked in second
- In what area they attacked in second
- The tower that was attacked first
Down
- How many Areas They planned to attack
- The tower that collapsed first
- The tower that collapsed second
- The month they attack
- Leader of the attacks
10 Clues: The month they attack • Leader of the attacks • What day It was the attack • The tower that collapsed first • The tower that collapsed second • The tower that was attacked first • In what area they attacked in second • How many Areas They planned to attack • How many Planes they used for the attack • The tower that it was attacked in second
warfare 2020-11-22
Across
- payment demanded for a prisoner
- a preconceived idea
- act of depredation
- detention or arrest
- of mixed character
- originating naturally in a particular place
- an attack made by aircraft
- a statement to inflict pain on someone
Down
- steel goods from a place or a ship
- one's opponent in a conflict
- a person or nation engaged in fighting
- an extremist group
- done secretively
- the authority to represent someone else
- an attack with a bomb
15 Clues: done secretively • an extremist group • act of depredation • of mixed character • a preconceived idea • detention or arrest • an attack with a bomb • an attack made by aircraft • one's opponent in a conflict • payment demanded for a prisoner • steel goods from a place or a ship • a person or nation engaged in fighting • a statement to inflict pain on someone • ...
Wonderful Pretty Cure! General Knowledge 2024-12-01
Across
- Niko's magical homeland (4,6)
- The Pretty Cures' hometown (6,4)
- Item for Cures Wonderful and Friendy's joint attack (8,4)
- Komugi and Iroha's transformation item (9,4)
- Item for Cures Nyammy and Lilian's joint attack (5,6,10)
Down
- Special magical animal who can lend strength to the Pretty Cures (7,6)
- The first monster that appears (8)
- Item for all four Cures' joint attack (7,6,6)
- Item that contains a portal to Niko's homeland (8,5)
- Yuki and Mayu's transformation item (5,4,4)
- Stone that granted Komugi and Yuki's wish to transform into humans (6,5)
- The second monster that appears (7)
12 Clues: Niko's magical homeland (4,6) • The Pretty Cures' hometown (6,4) • The first monster that appears (8) • The second monster that appears (7) • Yuki and Mayu's transformation item (5,4,4) • Komugi and Iroha's transformation item (9,4) • Item for all four Cures' joint attack (7,6,6) • Item that contains a portal to Niko's homeland (8,5) • ...
Cardi/Resp 2024-04-29
Across
- Infection causing inflammation of alveoli and bronchioles
- heart attack
- leading cause of stroke or heart failure
- can help with pneumonia
- Bacterial-antibiotics is considered
- 102 Degrees F is considered
Down
- chest pain
- symptom of asthma
- main cause of asthma
- What kind of technique helps with asthma
- Encouraged to drink for asthma care
- is a sign of a URI
- Determine the severity of attack
- hardened arteries
- Hypersensitivity reaction which constricts lung bronchi
15 Clues: chest pain • heart attack • symptom of asthma • hardened arteries • is a sign of a URI • main cause of asthma • can help with pneumonia • 102 Degrees F is considered • Determine the severity of attack • Encouraged to drink for asthma care • Bacterial-antibiotics is considered • What kind of technique helps with asthma • leading cause of stroke or heart failure • ...
Freedom vs Safety Review 2023-05-22
Across
- location of missile crisis in the 1960s that brought US & Soviet Union closest to nuclear war
- to prepare for nuclear war, many Americans built _____ shelters in their backyards
- In response to the Berlin ____, Truman airlifts in supplies to West Berlin to keep communism out
- leader of the Soviet Union at the start of the Cold War
- this highway system was created in part to help people evacuate from major cities in the case of a nuclear attack
- the ____ War ended with the country still divided along the 38th parallel
- name of drills used to practice response to nuclear attack
- prior to 9/11, worst terrorist attack in US occurred in this city
- tearing down the ______ and the breakup of the Soviet Union directly led to the end of the Cold War
Down
- known as the "witch hunt" of the Cold War; resulted in the firing of many gov't officials
- belief of the Cold War that if one country falls to communism other countries nearby will also fall
- US President at the end of the Cold War
- N.Vietnamese surprise attack; covered in the media; changed public opinion against the war
- airport security agency started after 9/11
- an incident in the Gulf of _____ prompts Johnson to fight a war in Vietnam
- battle for influence between US and Soviet Union over the best form of government
- couple caught spying for the Soviet Union during the Cold War; sentenced to death
- group responsible for September 11 attacks
18 Clues: US President at the end of the Cold War • airport security agency started after 9/11 • group responsible for September 11 attacks • leader of the Soviet Union at the start of the Cold War • name of drills used to practice response to nuclear attack • prior to 9/11, worst terrorist attack in US occurred in this city • ...
Cisco Security 2016-03-15
Across
- Known for fuzzing tools for software crash testing
- _____-_____ Cracking method trying every possible combination
- Attack which denys a machine or resource to intended users. (ABBR)
- First line of defense. Uses safe libraries, length checks, whitelists (2 words)
- Type of security including locked doors, badge readers and surveillance cams
- Monitored isolated data designed to study attack methods
- Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL _____
- Cisco team who manages receipt, investigation and reporting of security vulnerabilities
Down
- Attack which overwrites buffers boundary and adjacent memory
- "Security has to happen at the _________" - John Chambers
- Malicious intent hacker (2 words)
- Psychological manipulation of people to perform actions or divulge security info (2 words)
- Development process Cisco uses to increase resiliency and trustworthiness.
- First half of a login
- Hacker with protective intent (2 words)
15 Clues: First half of a login • Malicious intent hacker (2 words) • Hacker with protective intent (2 words) • Known for fuzzing tools for software crash testing • Monitored isolated data designed to study attack methods • "Security has to happen at the _________" - John Chambers • Attack which overwrites buffers boundary and adjacent memory • ...
esperanza reenace 2022-04-20
20 Clues: raid • mock • dawn • bills • folds • anger • sighs • cloud • plains • fields • attack • Lilies • Hairpins • trenches • pinnacle • Mesquite • barbed wire • Immigracion • Lace covering • irrigation ditch
Crucigrama 2013-01-13
21 Clues: Flu • Cold • Cure • Rash • Scar • Bump • Pain • Fever • Pills • Doctor • Cancer • Healer • Sprain • Dentist • Illness • Apsirin • Hospital • Oculista • Medicine • Antibiotics • Heart Attack
The Diary of Anne Frank 2015-02-02
20 Clues: joy • evil • hate • angry • shock • attack • sneaky • anxiety • instinct • horrified • miserable • bothering • luxuriate • unbearable • restrained • wild uproar • nourishment • dictatorship • understanding • unjust treatment
Unit 15-16 Crossword 2024-05-23
kpl 9 2022-05-10
20 Clues: laki • laiha • voima • kohde • oikeus • jatkaa • pahuus • yhteisö • kieltää • liittyä • hyökätä • koulutus • seuraava • nimittää • kaukainen • taistella • poliitikko • laiminlyödä • epätodennäköinen • Taliban Taliban-liike
Gilgamesh vocab cosi 2024-10-30
22 Clues: blue • wall • blue • tired • attack • marrage • verysad • confused • badsmell • fastwater • keepgoing • therefore • todestroy • loudnoice • armslength • go quickly • dissrespect • thrownabout • painfulmoving • deadbodyplace • largemovingthing • assumingpowerwithoutreason
List 3 & 4 2025-01-14
20 Clues: kind • wise • annoy • swell • proper • loving • stupid • attack • confirm • examine • dramatic • ridicule • peaceful • brilliant • explosive • accelerate • productive • instructive • side by side • inharmonious
6.03 Words 2015-06-15
Across
- really difficult puzzle or riddle
- worldwide, comprehensive
- to dry up, to shrivel, to lose freshness
- gunfire, explosions, attack, blasts
- to make really really mad
- false, unreal image (magic!)
- to satisfy thirst
- variety, mix, lots of similar but different things
- to brag in a bad way, to take someone else down when you do well
Down
- someone who dislikes people that are different
- herb, spice, wise person, smart person
- sacred promise
- landscape
- to provide a reason for doing something (runner wanting to win)
- to lie in wait and attack
- chosen, picked, selected
- peace lover, against war
- a line of people
- job
- to keep within limits, to confine
20 Clues: job • landscape • sacred promise • a line of people • to satisfy thirst • worldwide, comprehensive • chosen, picked, selected • peace lover, against war • to lie in wait and attack • to make really really mad • false, unreal image (magic!) • really difficult puzzle or riddle • to keep within limits, to confine • gunfire, explosions, attack, blasts • herb, spice, wise person, smart person • ...
