attack Crossword Puzzles
Attack at Nightfall 2026-03-09
8 Clues: What did Zac turn into? • When did the bats leave? • What colour are the trees? • What was swarming above Mim? • What are the flickering lights? • Where does this story take place? • What did Mim use the make a tourch? • What time of day does the story start?
CrossWord 2024-11-15
Across
- The art of disguising messages (11 letters)
- Testing a system’s defenses by simulating attacks (11 letters)
- A weakness that could allow an attacker to exploit a system (12 letters)
- Authentication method requiring two forms of verification (9 letters)
- Attack where attacker pretends to be a trusted entity (7 letters)
- Unauthorized entry into a system or network (7 letters)
- Unintentional or intentional access to sensitive data (7 letters)
- Malicious program that spreads across computers (5 letters)
- Software used to monitor and control network traffic (9 letters)
- Process of verifying identity (13 letters)
Down
- Hidden software used to maintain access on a system (8 letters)
- Converts plain text into an unreadable format (9 letters)
- A program designed to replicate itself and spread (5 letters)
- Type of cyber-attack where access is blocked until ransom is paid (9 letters)
- Technique to gain sensitive information through social interaction (10 letters)
- of attack where users are overwhelmed with traffic (7 letters)
- Protects against unauthorized access to data
- Unauthorized access or control over a system (4 letters)
- A harmful software disguised as legitimate
19 Clues: Process of verifying identity (13 letters) • A harmful software disguised as legitimate • The art of disguising messages (11 letters) • Protects against unauthorized access to data • Unauthorized entry into a system or network (7 letters) • Unauthorized access or control over a system (4 letters) • Converts plain text into an unreadable format (9 letters) • ...
Security 2023-03-28
Across
- - A network segment that is not part of an organization's internal network, but is still accessible from the internet.
- - The practice of secure communication in the presence of third parties.
- - A security algorithm for wireless networks.
- - A protocol suite for securing Internet Protocol (IP) communications.
- - A global network of interconnected computer networks.
- - A group of computers and other devices that are connected together to share resources and information.
- - A method of transferring data securely across an untrusted network, by encapsulating data
Down
- - A type of cyber attack in which multiple compromised systems attack a target,.
- - The study of analyzing and breaking encryption systems.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - A network of compromised computers that can be used to perform malicious activities.
- - A type of DDoS attack that floods a victim with ICMP echo request packets.
- - A protocol used in IPSec to provide confidentiality, integrity, and authenticity for IP packets.
- - A type of DDoS attack that uses long-form field input to overwhelm the target server.
14 Clues: - A security algorithm for wireless networks. • - A global network of interconnected computer networks. • - The study of analyzing and breaking encryption systems. • - A protocol suite for securing Internet Protocol (IP) communications. • - The practice of secure communication in the presence of third parties. • ...
Search And Destroy 2022-08-20
Across
- words or actions out of hostility
- type of aircraft used in war and commercially
- left something usally on bad terms
- set of commands to do
- if theres not a lot of info on it its ____
- similar to a mission
- to withdraw troops of supplies
- another name for a soldier
Down
- surprise attack
- lots in jungle
- Main character of book
- series of events that are memorable
- haven't made a decison
- solid area or surface on earth
- place where injuries and wounds are healed
- outdoor living area
- parents and siblings
- type of weapon used in war
18 Clues: lots in jungle • surprise attack • outdoor living area • parents and siblings • similar to a mission • set of commands to do • Main character of book • haven't made a decison • type of weapon used in war • another name for a soldier • solid area or surface on earth • to withdraw troops of supplies • words or actions out of hostility • left something usally on bad terms • ...
Asthma Crossword 2012-11-27
Across
- excessive amounts of this may lead to hyperventilation
- Name for a substance that triggers an asthma attack (ex. pet dander)
- One type of medication for asthma (inhaled _________)
- another word for consequences, risks, and ramifications
- one of the substances that mast cells release
- _________ asthma: caused by exercise
Down
- _______ asthma: caused by allergens
- Name of a short-term beta2 agonist
- shares triggers with asthma and is known to make an asthma attack worse
- another name for narrowing of the bronchiole
- part of airway that constricts during an asthma attack
- sometimes a predicator of asthma and can be controlled by healthy diet and exercise
- One in ________ adults have asthma
- exercise will make the respiratory muscles stronger, making breathlessness less perceptive
- increases the person's VO2max, which in turn increase size and strength
- or gastroesophageal reflux, include symptoms such as chest pain, heartburn, cough, and hoarseness
16 Clues: Name of a short-term beta2 agonist • One in ________ adults have asthma • _______ asthma: caused by allergens • _________ asthma: caused by exercise • another name for narrowing of the bronchiole • one of the substances that mast cells release • One type of medication for asthma (inhaled _________) • excessive amounts of this may lead to hyperventilation • ...
kevin 2021-10-05
Across
- an indiscriminate and brutal slaughter of people
- to attack a place continuously with bombs, shells, or missiles
- a territory that became five states in today's Midwest
- going about in search of things to steal or people to attack
- angular distance of a place north or south of the equator
Down
- to be forced to leave a place and never return
- to make an attack or assault in return for a similar attack
- area of land tenure governed by a federally recognized native tribe
- without the basic necessities of life
- to chain someone up with shackles
10 Clues: to chain someone up with shackles • without the basic necessities of life • to be forced to leave a place and never return • an indiscriminate and brutal slaughter of people • a territory that became five states in today's Midwest • angular distance of a place north or south of the equator • to make an attack or assault in return for a similar attack • ...
kevin 2021-10-05
Across
- to chain someone up with shackles
- to attack a place continuously with bombs, shells, or missiles
- area of land tenure governed by a federally recognized native tribe
- without the basic necessities of life
- to make an attack or assault in return for a similar attack
Down
- angular distance of a place north or south of the equator
- to be forced to leave a place and never return
- a territory that became five states in today's Midwest
- going about in search of things to steal or people to attack
- an indiscriminate and brutal slaughter of people
10 Clues: to chain someone up with shackles • without the basic necessities of life • to be forced to leave a place and never return • an indiscriminate and brutal slaughter of people • a territory that became five states in today's Midwest • angular distance of a place north or south of the equator • to make an attack or assault in return for a similar attack • ...
kevin 2021-10-05
Across
- to chain someone up with shackles
- to attack a place continuously with bombs, shells, or missiles
- area of land tenure governed by a federally recognized native tribe
- without the basic necessities of life
- to make an attack or assault in return for a similar attack
Down
- angular distance of a place north or south of the equator
- to be forced to leave a place and never return
- a territory that became five states in today's Midwest
- going about in search of things to steal or people to attack
- an indiscriminate and brutal slaughter of people
10 Clues: to chain someone up with shackles • without the basic necessities of life • to be forced to leave a place and never return • an indiscriminate and brutal slaughter of people • a territory that became five states in today's Midwest • angular distance of a place north or south of the equator • to make an attack or assault in return for a similar attack • ...
World War 2 2020-12-17
Across
- power union of german italy and japan
- harbor attack attack in whick jappan attack USA
- Churchill leader of grear britain
- Army of german
- 3d Reich of German
Down
- forces union of USA Great Britain, etc
- technique of digging in the ground
- Mussolini Leader of italy
- kin of people nazis search for kill
- S truman last leader of usa in the war
10 Clues: Army of german • 3d Reich of German • Mussolini Leader of italy • Churchill leader of grear britain • technique of digging in the ground • kin of people nazis search for kill • power union of german italy and japan • forces union of USA Great Britain, etc • S truman last leader of usa in the war • harbor attack attack in whick jappan attack USA
The Outsiders 2024-11-07
Across
- – Something Johnny endures from his father, showing his troubled home life.
- – A tough Greaser who shows a softer side when he sees Johnny hurt.
- – The type of car the Socs drove, symbolizing their wealth and power.
- – The narrator who starts to see similarities between the Socs and Greasers.
- – Johnny would carry this as a lifelong reminder of the attack.
- – Soc girl who befriends Ponyboy and shares that “things are rough all over.”
- – Fights between the Greasers and Socs, often escalating their rivalry.
Down
- – Johnny started carrying this for protection after his traumatic experience.
- – A common way for the Greasers and Socs to resolve their conflicts, often resulting in violence.
- – Character who was deeply traumatized by an attack from the Socs.
- – An intense feeling Johnny experienced after his attack, leading to lasting trauma.
- – Symbol of the violent conflict; Johnny’s shirt was splattered with this after the attack.
- – The group of friends from the East Side known for their loyalty and tough exterior.
- – The wealthier group from the West Side who bully the Greasers.
14 Clues: – Johnny would carry this as a lifelong reminder of the attack. • – The wealthier group from the West Side who bully the Greasers. • – Character who was deeply traumatized by an attack from the Socs. • – A tough Greaser who shows a softer side when he sees Johnny hurt. • – The type of car the Socs drove, symbolizing their wealth and power. • ...
Information Security - Crossword 2024-03-25
Across
- A security protocol that provides secure communication over a network, often used for remote access
- A type of authentication that verifies a user's identity based on physical characteristics
- A security measure that restricts access based on the principle of least privilege
- A cryptographic key that is kept secret and used for decrypting data
- A protocol used to secure email communication
- A program or device that identifies and authenticates a user's identity electronically
- An attack that involves intercepting and altering communication between two parties
- A method of encrypting data that uses a single key for both encryption and decryption
Down
- The act of tricking individuals into revealing sensitive information
- A type of attack that uses social engineering to manipulate individuals into taking specific actions
- A type of malware that hides its presence and can perform malicious actions without user knowledge
- A type of attack that floods a system with excessive traffic to disrupt normal operation
- A security incident response plan to restore systems and operations after an attack
- A technique used to ensure data integrity by creating a unique hash value for a file
- Software used to detect and prevent unauthorized access to a computer network
15 Clues: A protocol used to secure email communication • The act of tricking individuals into revealing sensitive information • A cryptographic key that is kept secret and used for decrypting data • Software used to detect and prevent unauthorized access to a computer network • A security measure that restricts access based on the principle of least privilege • ...
Security CrossWord 2014-03-28
Across
- Who use their dexterity/proficiency explicitly for vicious ends like compromising the application and getting confidential data with viruses or phishing
- A program/attack used by which the cracked/attacked part of network is inoperable
- The Secure layer before executing any request that performs Request, Parameter, Header and cookie size checks in CITI related applications
- A harmful software program in disguise
- The Security Filter developed by CITI to validate the request parameters to mach predefined regex patterns
- Anti-Automation Security that was implemented across CITI applications to prevent Denial Of Service attack.
- If this technique is implemented the rainbow tables which are generally created by hackers cannot be created before the attack
Down
- A set of machines that have been trapped by a virus, worm etc., and placed under the control of one or more
- URL when added in this list can bypass all the Enforcement filters.
- The Security feature developed by CITI that validates the threshold limits for actions by having a centralized/distributed monitoring on each JVM
- Cryptographic transformation of data results in ________ text
- Attack where the cyber attackers specifically targets for less number of individuals or to specific groups
- Attack through which the system gets compromised by trying only a possible set of passwords
13 Clues: A harmful software program in disguise • Cryptographic transformation of data results in ________ text • URL when added in this list can bypass all the Enforcement filters. • A program/attack used by which the cracked/attacked part of network is inoperable • Attack through which the system gets compromised by trying only a possible set of passwords • ...
viruses 2018-11-16
Across
- virus file spread through ichat instant messaging. The file is called “latestpics.tgz”. The user should open the compressed file and open the executable inside the compressed file.
- the machines, wiring, and other physical components of a computer or other electronic system.
- counter to a virus
- a person who uses computers to gain unauthorized access to data
- a distributed denial-of-service (DDoS) attack is a malicious attempt to bring down networks
- nitiated a distributed denial of service (DDoS) attack on the White House.
- pretends to be something else but is still a virus
- Many computer networks were unprepared for the attack, and as a result the virus brought down several important systems. The Bank of America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors.
- One trigger caused the virus to begin a denial of service (DoS) attack starting Feb. 1, 2004. The second trigger commanded the virus to stop distributing itself on Feb. 12, 2004. Even after the virus stopped spreading, the backdoors created during the initial infections remained active [source: Symantec].
- a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- according to TruSecure CTO Peter Tippett,it only took 22 minutes for this attack to be at the top of most reported attacks
Down
- messages distributed by electronic means from one computer user to one or more recipients via a network:
- the programs and other operating information used by a computer:
- ttacked computers through a Microsoft Windows vulnerability. Unlike other worms, it didn't spread through e-mail. Instead, once the virus infected a computer, it looked for other vulnerable systems. It contacted those systems and instructed
- when someone send you a eamail asking for personal info
- Once activated, the virus replicates itself and sends itself out to the top 50 people in the recipient's e-mail address book.
- is a Trojan horse program. Its payload is another program, though not always the same one. Some versions of the Storm Worm turn computers into zombies or bots. As computers become infected, they become vulnerable to remote control by the person behind the attack.
- infected a victim's computer through an e-mail message, replicated itself and then sent itself to people in the victim's address book.
- virus initially traveled the Internet by e-mail, just like the Melissa virus.
19 Clues: counter to a virus • pretends to be something else but is still a virus • when someone send you a eamail asking for personal info • a person who uses computers to gain unauthorized access to data • the programs and other operating information used by a computer: • nitiated a distributed denial of service (DDoS) attack on the White House. • ...
chapter 7 2021-10-06
Across
- an area of land set aside for occupation by North American Indians.
- going about in search of things to steal or people to attack.
- a person who lives away from their native country, either from choice or compulsion.
- the land between the Great lakes,Mississippi and the Ohio river
- an indiscriminate and brutal slaughter of people.
Down
- chain with shackles
- attack continuously with bomb,shells, or other missiles
- make a attack or assault in return of a similar attack
- regions, especially with reference to their temperature and distance from the equator
- without the basic necessities of life
10 Clues: chain with shackles • without the basic necessities of life • an indiscriminate and brutal slaughter of people. • make a attack or assault in return of a similar attack • attack continuously with bomb,shells, or other missiles • going about in search of things to steal or people to attack. • the land between the Great lakes,Mississippi and the Ohio river • ...
Cross words22 2021-07-18
Across
- Used by computers to solve problems
- Type of malware attack
- Home for servers
- Method to covert data into more secure form
- Collection of data
- Part of Cloud computing
- Known for all unauthorized activities
- An ecosystem to solve real life problem
- A fraud practice to send email
- Mostly a part of mail
Down
- Occurrence of unusual event
- A way of reducing manual tasks
- A way of working in Corporate world
- Activity which is frequent done by our Team
- Part of network Security
- Block chain technology
- Methodology to improve work
- Legacy of fresco family
- Counter attack to unauthorized use of system
19 Clues: Home for servers • Collection of data • Mostly a part of mail • Type of malware attack • Block chain technology • Legacy of fresco family • Part of Cloud computing • Part of network Security • Occurrence of unusual event • Methodology to improve work • A way of reducing manual tasks • A fraud practice to send email • Used by computers to solve problems • ...
All Quiet on the Western Front 2026-03-08
Across
- Fixed amount of food given to each person
- intense support of ones nation
- tiredness due to mental or physical exertion
- Main character
- Breakdown due to intense combat experience
- Main force protagonist is in
- living or continually existing
- Obligation to complete goal/task
Down
- large number of something that typically causes disease
- excluded from a group
- Area where the army is fighting
- Long narrow ditch
- Corporal and antagonist during basic training
- Main enemy force
- cannot be satisfied
- Gloomy or resentful
- Harmful chemical gas used to poison air in preparation for an attack
- strong continuous attack usually with bombs
- Blunt/harsh
19 Clues: Blunt/harsh • Main character • Main enemy force • Long narrow ditch • cannot be satisfied • Gloomy or resentful • excluded from a group • Main force protagonist is in • intense support of ones nation • living or continually existing • Area where the army is fighting • Obligation to complete goal/task • Fixed amount of food given to each person • ...
Criminal Law 2015-01-29
Across
- ศาลฎีกา
- ค่าปรับ
- การกักขัง
- อันตรายทางด้านจิตใจ
- การปล้นที่มีผู้กระทำมากกว่าสามคนขึ้นไป
- ทำร้ายร่างกาย
- การกระทำผิดกฎหมายโดยเตนา
- การฆาตกรรม
- เยาวชน
- ศาลอุทธรณ์
Down
- การประหารชีวิต
- การใช้กำลัง
- การขโมยโดยใช้กำลังและอาวุธ
- การกระทำผิดกฎหมายโดยไม่เจตนา
- การกระทำผิดกฎหมายโดยประมาท
- อันตรายทางด้านจิตใจ
- อาวุธ
- การกระทำที่ผิดกฎหมาย
- ทรัพย์สิน
- ศาลชั้นต้น
20 Clues: อาวุธ • เยาวชน • ศาลฎีกา • ค่าปรับ • การกักขัง • ทรัพย์สิน • ศาลชั้นต้น • การฆาตกรรม • ศาลอุทธรณ์ • การใช้กำลัง • ทำร้ายร่างกาย • การประหารชีวิต • อันตรายทางด้านจิตใจ • อันตรายทางด้านจิตใจ • การกระทำที่ผิดกฎหมาย • การกระทำผิดกฎหมายโดยเตนา • การขโมยโดยใช้กำลังและอาวุธ • การกระทำผิดกฎหมายโดยประมาท • การกระทำผิดกฎหมายโดยไม่เจตนา • การปล้นที่มีผู้กระทำมากกว่าสามคนขึ้นไป
4kader - Unit 3 2019-11-04
19 Clues: save • cope • crew • brief • profit • insist • attack • tackle • rescue • attract • despite • skilled • control • journey • heroine • opposite • scientist • intention • fulfilling
spanish terms 2023-05-03
unit 9 2023-08-02
20 Clues: deny • evil • right • human • fight • united • forbid • target • attack • leader • survive • freedom • although • continue • sensitive • immigrant • represent • following • emphasize • fortunately
Schools in the past BLOGGERS 1 2021-09-22
19 Clues: írni • trón • tart • ókori • drága • görög • házas • szünet • vessző • alapít • tanult • terület • egyetem • szigorú • mérföld • magolni • megtámad • mindemellett • barátságtalan
Latin II Pyrrhus of Epirus 2024-04-18
19 Clues: in • acer • levo • olim • contra • potens • caelum • autaut • navigo • amitto • impetus • integer • obtineo • propter • facilis • fintimus • proelium • commoveo • exercitus
โรคในผู้สูงอายุ 2025-07-15
20 Clues: DM • acute • palsy • attack • stroke • insulin • hypoxia • rupture • chronic • aneurysm • Arrhythmia • thrombosis • hemorrhage • Infarction • hypoglycemia • PANCREATITIS • hypertension • Dyslipidemia • hypoglycemia • eccocardiogram
6.1 2021-11-30
Guess what! 2013-11-13
19 Clues: Less • Even • Move • Male • Solve • Truth • Future • Danger • Victim • Attack • Single • Office • Sister • Parents • Shouted • Remember • Difficult • Dangerous • Shoplifter
4GT - Unit 3 2026-01-19
19 Clues: cure • notice • effort • rescue • betray • attack • attempt • heroine • bargain • citizen • journey • solution • preserve • exciting • intention • sufficient • disruption • countryside • contribution
Security 2023-03-28
Across
- - The practice of secure communication in the presence of third parties.
- - A type of DDoS attack that uses long-form field input to overwhelm the target server.
- - A network segment that is not part of an organization's internal network, but is still accessible from the internet.
- - A group of computers and other devices that are connected together to share resources and information.
- - A network of compromised computers that can be used to perform malicious activities.
- - A method of transferring data securely across an untrusted network, by encapsulating data
- - A protocol suite for securing Internet Protocol (IP) communications.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - A protocol used in IPSec to provide confidentiality, integrity, and authenticity for IP packets.
Down
- - The study of analyzing and breaking encryption systems.
- - A type of cyber attack in which multiple compromised systems attack a target,.
- - A type of DDoS attack that floods a victim with ICMP echo request packets.
- - A global network of interconnected computer networks.
- - A security algorithm for wireless networks.
14 Clues: - A security algorithm for wireless networks. • - A global network of interconnected computer networks. • - The study of analyzing and breaking encryption systems. • - A protocol suite for securing Internet Protocol (IP) communications. • - The practice of secure communication in the presence of third parties. • ...
#InfraNet Cyber Awareness 2022-10-13
Across
- Security or house
- Password attack method
- Doesn'trequire a host file to replicate itself
- This horse can stampede your security defenses
- Who is responsible for cybersecurity
- Verifying identity
- Unauthorized access to a network
- Scrambling text into an unreadable format
- Similar to a password
Down
- Any crime committed electronically
- Watches where you go on the internet
- Multi-factor authentication
- Cyber awareness month
- Wireless technology using short-wave UHF radio waves
- Attack attempt to acquire personal information
- Prevents unauthorized access to or from a private network
- The address of a webpage
- Program that is designed to automate tasks
- Chief information security officer
19 Clues: Security or house • Verifying identity • Cyber awareness month • Similar to a password • Password attack method • The address of a webpage • Multi-factor authentication • Unauthorized access to a network • Any crime committed electronically • Chief information security officer • Watches where you go on the internet • Who is responsible for cybersecurity • ...
Cross words 2021-07-18
Across
- Part of Cloud computing
- Occurrence of unusual event
- A way of working in Corporate world
- Methodology to improve work
- Type of malware attack
- Counter attack to unauthorized use of systems
- Block chain technology
- Legacy of fresco family
- Used by computers to solve problems
Down
- Collection of data
- Home for servers
- A fraud practice to send email
- Mostly a part of mail
- Method to covert data into more secure form
- An ecosystem to solve real life problem
- Known for all unauthorized activities
- Activity which is frequent done by our Team
- Part of network Security
- Smart way of reducing manual tasks
19 Clues: Home for servers • Collection of data • Mostly a part of mail • Type of malware attack • Block chain technology • Part of Cloud computing • Legacy of fresco family • Part of network Security • Occurrence of unusual event • Methodology to improve work • A fraud practice to send email • Smart way of reducing manual tasks • A way of working in Corporate world • ...
Cross words1 2021-07-18
Across
- Part of Cloud computing
- Occurrence of unusual event
- A way of working in Corporate world
- Methodology to improve work
- Type of malware attack
- Counter attack to unauthorized use of system
- Block chain technology
- Legacy of fresco family
- Used by computers to solve problems
Down
- Collection of data
- Home for servers
- A fraud practice to send email
- Mostly a part of mail
- Method to covert data into more secure form
- An ecosystem to solve real life problem
- Known for all unauthorized activities
- Activity which is frequent done by our Team
- Part of network Security
- Smart way of reducing manual tasks
19 Clues: Home for servers • Collection of data • Mostly a part of mail • Type of malware attack • Block chain technology • Part of Cloud computing • Legacy of fresco family • Part of network Security • Occurrence of unusual event • Methodology to improve work • A fraud practice to send email • Smart way of reducing manual tasks • A way of working in Corporate world • ...
antonyms 2021-09-09
19 Clues: sad • thin • sink • slow • short • Depart • Guilty • scared • excited • - Sharp • - Solid • subtract • multiply • - Cloudy • - Defend • difficult • - Terrible • interesting • Complicated
4K - Unit 3 2025-01-27
20 Clues: cope • save • crew • brief • limit • attack • rescue • profit • tackle • insist • control • attract • despite • skilled • journey • heroine • opposite • intention • scientist • fulfilling
Cyber CYber 2024-10-07
Across
- KEY INFRASTRUCTURE What framework manages digital certificates and public-key encryption?
- What acronym refers to a security operations center responsible for monitoring and analyzing security incidents?
- VULNERABILITY What do you call a programming flaw that can be exploited by attackers?
- RECOVERY What term describes a strategy for recovering from a cyber incident?
- A security measure that helps prevent unauthorized access to a network?
- WEB What term refers to the part of the internet that is not indexed by traditional search engines?
- What type of software is potentially unwanted and often bundled with legitimate software?
- What type of malware allows remote access to a user's device?
- What term refers to a security incident where sensitive data is accessed without authorization?
- DETECTION A tool or process for detecting unauthorized access to a system?
- A type of cyber attack where the attacker impersonates a legitimate user?
- TESTING A systematic examination of a system for security weaknesses?
- What term describes malicious code that appears legitimate?
- What term is used for a password that is difficult to guess?
- Which type of attack sends a flood of traffic to overwhelm a network?
- THEFT The unauthorized use of someone's personal data is known as?
- FLOOD What type of DDoS attack exploits the TCP handshake process?
- What type of encryption uses two different keys for encryption and decryption?
- The practice of obtaining sensitive information by deception is known as?
- What type of cryptographic attack tries all possible combinations of keys?
Down
- A method used to authenticate users based on physical characteristics?
- What do you call a security measure that uses two or more methods to verify identity?
- A series of steps taken to ensure the security of information systems?
- The information that is collected to assess vulnerabilities?
- SCANNING What is a method for identifying weaknesses in a system’s security?
- What is the process of converting plaintext into ciphertext?
- What type of software is designed to disrupt, damage, or gain unauthorized access to computer systems?
- A malicious user who seeks to exploit system vulnerabilities?
- The act of attempting to steal data through exploiting weak points?
- What refers to the principle of least privilege in cybersecurity?
- What technique uses social interactions to manipulate individuals into giving up confidential information?
- What type of malware can replicate itself and spread to other computers?
- The process of decoding information or data that has been encrypted?
- What is a security resource whose value lies in being probed, attacked, or compromised?
- A collection of related data that may be exposed during a breach is called?
- SCRIPTING What is the type of attack that injects malicious scripts into webpages viewed by users?
- ATTACK A planned attack to capture sensitive information over a network?
- IDS What term refers to a system that captures and stores network traffic?
- TOKEN What is a deceptive marker used to detect unauthorized access or data leaks?
- A malicious email that pretends to be from a trustworthy source?
40 Clues: What term describes malicious code that appears legitimate? • The information that is collected to assess vulnerabilities? • What is the process of converting plaintext into ciphertext? • What term is used for a password that is difficult to guess? • A malicious user who seeks to exploit system vulnerabilities? • ...
Cross words 2021-07-18
Across
- mostly a part of mail
- Part of Cloud computing
- Block chain technology
- Methodology to improve work
- A fraud practice to send email
- Legacy of fresco family
- Home for servers
- Collection of data
- A way of working in Corporate world
- occurrence of unusual event
- used by computers to solve problems
Down
- Part of network Security
- Method covert data into more secure frm
- An ecosystem to solve real life problem
- Type of malware attack
- Activity which is frequent done by Team
- smart way of reducing manual tasks
- Known for all unauthorized activities
- Counter attack to unauthorized use of sys
19 Clues: Home for servers • Collection of data • mostly a part of mail • Type of malware attack • Block chain technology • Part of Cloud computing • Legacy of fresco family • Part of network Security • Methodology to improve work • occurrence of unusual event • A fraud practice to send email • smart way of reducing manual tasks • A way of working in Corporate world • ...
Week 3 Unit Vocabulary/KLW 2020-09-03
Across
- to stop short and refuse to proceed
- to make amends
- a group of animals; and assemblage
- to make or become greater
- any overwhelming attack as of words or blows
- something left to someone in a will
- military supplies and weapons
- a small, inexpensive trinket
- a gradual reduction or weakening
- to attribute to a specific cause
Down
- lacking floavor or zest; dull
- to attack violently
- being in a state of intellectual darkness, ignorance
- threatening, hurtful
- to soothe, to pacify
- a place or scene of noisy uproar and confusion
- the highest peak point
- sill, stupid
- the unlawful beating of a person
19 Clues: sill, stupid • to make amends • to attack violently • threatening, hurtful • to soothe, to pacify • the highest peak point • to make or become greater • a small, inexpensive trinket • lacking floavor or zest; dull • military supplies and weapons • the unlawful beating of a person • a gradual reduction or weakening • to attribute to a specific cause • a group of animals; and assemblage • ...
BPB 2023-03-14
Across
- The best instructor of BPB.
- Freedom from attack and Freedom to attack.(two words)
- The foundation of our Profession of Arms.
- what great leader start off as.
- Motivating, influencing, and directing personnel.
- Enable cross-utiliization training to support Agile Combat Employment.
- Semper Fidelis.
- Connect our families with our units.
- Honesty, Courage, Accountability, Humility.
Down
- Transform a climate of corrosion into a climate of ethical commitment. (two words)
- Noncommissioned Officers.
- The obligation to preform.
- Upholding the highest standards.
- Career broadening roles.
- A mindset.
- You Are Never Forgotten.
- This We'll Defend
- A tradition of honor, and a legacy of valor.
- Do solemnly swear.
19 Clues: A mindset. • Semper Fidelis. • This We'll Defend • Do solemnly swear. • Career broadening roles. • You Are Never Forgotten. • Noncommissioned Officers. • The obligation to preform. • The best instructor of BPB. • what great leader start off as. • Upholding the highest standards. • Connect our families with our units. • The foundation of our Profession of Arms. • ...
4basis Unit 3 2018-11-06
19 Clues: cure • area • crew • hero • cope • save • effort • attack • option • reject • create • threat • control • breathe • heroine • skilled • distance • graduate • intention
ronin ristikko 2022-05-05
19 Clues: lupa • takka • laiha • pahuus • epäily • liittyä • hyökätä • johtaja • yhteisö • tiukasti • koulutus • läsnäolo • valmistua • yliopisto • tuntematon • hän_syntyi • maahanmuuttaja • talibaani_liike • epätodennäköinen
Globalization 2023-04-15
19 Clues: Help • Rags • Award • Online • Attack • Living • Global • Ability • Fairness • Increase • Exchange • Discovery • Companies • Employment • Businesses • Advantages • Responsible • Surrounding • Conversation
Virus Crossword Jason Milgate 2019-11-05
Across
- a virus that replicates itself to spread to other computers
- a bad computer program designed to attack software
- scams that look real but try to bait you into getting scammed
- programs that your computer runs
- the act of using a computer to gain unauthorized access to data
- a download that takes place without your consent on a website
- a data storage device that can be plugged into any computer with a USB port
- electronic mail
Down
- a distributed denial of service attack
- a virus that encrypts your data and forces you to pay money to get it back
- a virus disguised as legitimate software
- coding information so that it cannot be accessed
- software designed to do bad things
- a virus spread through email that overwrote your information
- the first virus to attack hardware
15 Clues: electronic mail • programs that your computer runs • software designed to do bad things • the first virus to attack hardware • a distributed denial of service attack • a virus disguised as legitimate software • coding information so that it cannot be accessed • a bad computer program designed to attack software • a virus that replicates itself to spread to other computers • ...
warfare 2020-11-22
Across
- payment demanded for a prisoner
- a preconceived idea
- act of depredation
- detention or arrest
- of mixed character
- originating naturally in a particular place
- an attack made by aircraft
- a statement to inflict pain on someone
Down
- steel goods from a place or a ship
- one's opponent in a conflict
- a person or nation engaged in fighting
- an extremist group
- done secretively
- the authority to represent someone else
- an attack with a bomb
15 Clues: done secretively • an extremist group • act of depredation • of mixed character • a preconceived idea • detention or arrest • an attack with a bomb • an attack made by aircraft • one's opponent in a conflict • payment demanded for a prisoner • steel goods from a place or a ship • a person or nation engaged in fighting • a statement to inflict pain on someone • ...
Extra crossword 2016-03-14
19 Clues: aap • tam • hek • leeuw • veilig • kennis • geweer • eiland • niemand • ontbijt • aanraken • vanavond • werkelijk • overslaan • ondeugend • overleven • aanvallen • herstellen • ongemakkelijk
Nonas - No Better Friend 2020-03-27
19 Clues: lack • turn • noise • climb • ships • shore • dirty • dress • sneak • entire • attack • murmur • satisfy • missile • solidify • continue • oppressed • corrosion • threatening
9th grade Unit 2 2025-01-16
19 Clues: kmen • věrný • drbat • tajně • soucit • popsat • soudit • dovolit • podrbat • sobecký • zlepšit • lidstvo • zrcadlit • zaútočit • nečestný • společník • rozmazlit • bratrstvo • tvrdohlavý
Latin 4 2025-02-28
21 Clues: do • via • sto • capio • deleo • facio • cupio • moneo • pugno • maneo • iubeo • notus • venio • iacio • venio • clarus • incola • festino • oppugno • aedifico • appropinquo
Long QT 2025-02-27
Across
- treatment for LQTS between beta blockers and ICD
- feature of T-waves in LQT1
- polymorphic vt caused by LQTS where QRS "twist" around the isolectric line
- feature of T-waves in LQT2
- classic presentation of attack for LQT1
- primary liquid treatment used for arrhythmia prevention in lqts
- classic presentation of attack for LQT3
Down
- feature of T-waves in LQT3
- name of criteria for LQTS
- percent of patients we find known gene defects for
- classic presentation of attack for LQT2
11 Clues: name of criteria for LQTS • feature of T-waves in LQT3 • feature of T-waves in LQT1 • feature of T-waves in LQT2 • classic presentation of attack for LQT1 • classic presentation of attack for LQT2 • classic presentation of attack for LQT3 • treatment for LQTS between beta blockers and ICD • percent of patients we find known gene defects for • ...
9/11 attacks 2025-05-02
Across
- How many Planes they used for the attack
- What day It was the attack
- The tower that it was attacked in second
- In what area they attacked in second
- The tower that was attacked first
Down
- How many Areas They planned to attack
- The tower that collapsed first
- The tower that collapsed second
- The month they attack
- Leader of the attacks
10 Clues: The month they attack • Leader of the attacks • What day It was the attack • The tower that collapsed first • The tower that collapsed second • The tower that was attacked first • In what area they attacked in second • How many Areas They planned to attack • How many Planes they used for the attack • The tower that it was attacked in second
Wonderful Pretty Cure! General Knowledge 2024-12-01
Across
- Niko's magical homeland (4,6)
- The Pretty Cures' hometown (6,4)
- Item for Cures Wonderful and Friendy's joint attack (8,4)
- Komugi and Iroha's transformation item (9,4)
- Item for Cures Nyammy and Lilian's joint attack (5,6,10)
Down
- Special magical animal who can lend strength to the Pretty Cures (7,6)
- The first monster that appears (8)
- Item for all four Cures' joint attack (7,6,6)
- Item that contains a portal to Niko's homeland (8,5)
- Yuki and Mayu's transformation item (5,4,4)
- Stone that granted Komugi and Yuki's wish to transform into humans (6,5)
- The second monster that appears (7)
12 Clues: Niko's magical homeland (4,6) • The Pretty Cures' hometown (6,4) • The first monster that appears (8) • The second monster that appears (7) • Yuki and Mayu's transformation item (5,4,4) • Komugi and Iroha's transformation item (9,4) • Item for all four Cures' joint attack (7,6,6) • Item that contains a portal to Niko's homeland (8,5) • ...
Cisco Security 2016-03-15
Across
- Known for fuzzing tools for software crash testing
- _____-_____ Cracking method trying every possible combination
- Attack which denys a machine or resource to intended users. (ABBR)
- First line of defense. Uses safe libraries, length checks, whitelists (2 words)
- Type of security including locked doors, badge readers and surveillance cams
- Monitored isolated data designed to study attack methods
- Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL _____
- Cisco team who manages receipt, investigation and reporting of security vulnerabilities
Down
- Attack which overwrites buffers boundary and adjacent memory
- "Security has to happen at the _________" - John Chambers
- Malicious intent hacker (2 words)
- Psychological manipulation of people to perform actions or divulge security info (2 words)
- Development process Cisco uses to increase resiliency and trustworthiness.
- First half of a login
- Hacker with protective intent (2 words)
15 Clues: First half of a login • Malicious intent hacker (2 words) • Hacker with protective intent (2 words) • Known for fuzzing tools for software crash testing • Monitored isolated data designed to study attack methods • "Security has to happen at the _________" - John Chambers • Attack which overwrites buffers boundary and adjacent memory • ...
Cardi/Resp 2024-04-29
Across
- Infection causing inflammation of alveoli and bronchioles
- heart attack
- leading cause of stroke or heart failure
- can help with pneumonia
- Bacterial-antibiotics is considered
- 102 Degrees F is considered
Down
- chest pain
- symptom of asthma
- main cause of asthma
- What kind of technique helps with asthma
- Encouraged to drink for asthma care
- is a sign of a URI
- Determine the severity of attack
- hardened arteries
- Hypersensitivity reaction which constricts lung bronchi
15 Clues: chest pain • heart attack • symptom of asthma • hardened arteries • is a sign of a URI • main cause of asthma • can help with pneumonia • 102 Degrees F is considered • Determine the severity of attack • Encouraged to drink for asthma care • Bacterial-antibiotics is considered • What kind of technique helps with asthma • leading cause of stroke or heart failure • ...
mari 2020-11-22
Across
- one's opponent in a conflict
- of mixed character
- the authority to represent someone else
- a person or nation engaged in fighting
- originating naturally in a particular place
- detention or arrest
- steel goods from a place or a ship
- a statement to inflict pain on someone
Down
- an attack made by aircraft
- act of depredation
- payment demanded for a prisoner
- a preconceived idea
- an attack with a bomb
- done secretively
- an extremist group
15 Clues: done secretively • act of depredation • of mixed character • an extremist group • a preconceived idea • detention or arrest • an attack with a bomb • an attack made by aircraft • one's opponent in a conflict • payment demanded for a prisoner • steel goods from a place or a ship • a person or nation engaged in fighting • a statement to inflict pain on someone • ...
juan hunger games 2013-01-07
Across
- braided
- harmful hurtful unhealthy
- lacking in quantity or quality
- weakness
- to attack or to incite to attack (used as a command)
- behavior toward others
- opponents in a contest
- two teenagers who are picked to be in the hunger games
- a place of fiery heat or destruction
- to wrap tightly with cloth
- lacks freshness unoriginal
Down
- weakened by old age or illness
- retelling of an interesting or funny indecent or event
- mean and vicious
- in a daze shock
- unaware
- to burn without a flame
- the devil someone wicked or evil
- care or provision for the future
- to confuse or baffle
- a person or animal's intestines or organs
21 Clues: braided • unaware • weakness • in a daze shock • mean and vicious • to confuse or baffle • behavior toward others • opponents in a contest • to burn without a flame • harmful hurtful unhealthy • to wrap tightly with cloth • lacks freshness unoriginal • weakened by old age or illness • lacking in quantity or quality • the devil someone wicked or evil • care or provision for the future • ...
Troy 2016-11-09
Across
- Where was Paris from?
- The best Trojan warrior
- Where was Helen from?
- Was Troy in Greece?
- Who was Menelaus' brother?
- Achilles wanted __________
- Agamemnon wanted to ________ Troy
- Achilles' only weak spot
- The best warrior on the Greek side
- Who was Helen's husband?
- Who fell in love with Paris?
Down
- Agamemnon raised a massive ______ to attack Troy
- Achilles' mother
- King of Troy
- _____ thousand ships
- Cousin of Hector and Paris
- Menelaus wanted to ______ Helen for leaving him
- Troy was a _______
- Who took Helen?
- Hector's wife
- What country was Sparta in?
- Helen was an ________ for Agamemnon to attack Troy
- Agamemnon was the most powerful ______ in Greece
23 Clues: King of Troy • Hector's wife • Who took Helen? • Achilles' mother • Troy was a _______ • Was Troy in Greece? • _____ thousand ships • Where was Paris from? • Where was Helen from? • The best Trojan warrior • Achilles' only weak spot • Who was Helen's husband? • Cousin of Hector and Paris • Who was Menelaus' brother? • Achilles wanted __________ • What country was Sparta in? • ...
Vocab Units 11-12 Review 2026-01-22
Across
- ancient; old-fashioned
- to overwhelm; to surround and attack
- spying
- steadfastness in doing something despite difficulty or delay in achieving success
- (adj.) open to attack; capable of being wounded or damaged; unprotected
- Dangerous; risky; lacking in security or stability
- on the alert; watchful
- (v.) to make calm, soothe; to relieve, satisfy; to yield to
- not able to be defeated, unbeatable
- To decrease gradually
Down
- freedom
- stormy, harsh; severe in attitude or action
- a false reason, deceptive excuse
- a copy or imitation
- great destruction or damage
- To deceive; to charm; to enchant
- to inflict
- to begin, to start
- mild and pleasant
- independence
20 Clues: spying • freedom • to inflict • independence • mild and pleasant • to begin, to start • a copy or imitation • To decrease gradually • ancient; old-fashioned • on the alert; watchful • great destruction or damage • a false reason, deceptive excuse • To deceive; to charm; to enchant • not able to be defeated, unbeatable • to overwhelm; to surround and attack • ...
/ei/ - seize and -gress- -grad- crossword 2026-02-18
Across
- slowly over time
- ready to attack or very forceful
- completed school or earned a degree
- one or the other
- moved forward or improved
- went backward or worsened
- too much pride in oneself
- hostile or attacking behavior
- sudden attack or loss of control
- fake; not genuine
- to form an idea or become pregnant
Down
- a stimulant found in coffee and tea
- judging or giving a score
- to notice or become aware of
- gradual changes in level or color
- forward movement or development
- to trick or mislead
- to go off the main topic
- a return to an earlier state
- dishonest; tricky
- a way out; an exit
21 Clues: slowly over time • one or the other • dishonest; tricky • fake; not genuine • a way out; an exit • to trick or mislead • to go off the main topic • judging or giving a score • moved forward or improved • went backward or worsened • too much pride in oneself • to notice or become aware of • a return to an earlier state • hostile or attacking behavior • forward movement or development • ...
Freedom vs Safety Review 2023-05-22
Across
- location of missile crisis in the 1960s that brought US & Soviet Union closest to nuclear war
- to prepare for nuclear war, many Americans built _____ shelters in their backyards
- In response to the Berlin ____, Truman airlifts in supplies to West Berlin to keep communism out
- leader of the Soviet Union at the start of the Cold War
- this highway system was created in part to help people evacuate from major cities in the case of a nuclear attack
- the ____ War ended with the country still divided along the 38th parallel
- name of drills used to practice response to nuclear attack
- prior to 9/11, worst terrorist attack in US occurred in this city
- tearing down the ______ and the breakup of the Soviet Union directly led to the end of the Cold War
Down
- known as the "witch hunt" of the Cold War; resulted in the firing of many gov't officials
- belief of the Cold War that if one country falls to communism other countries nearby will also fall
- US President at the end of the Cold War
- N.Vietnamese surprise attack; covered in the media; changed public opinion against the war
- airport security agency started after 9/11
- an incident in the Gulf of _____ prompts Johnson to fight a war in Vietnam
- battle for influence between US and Soviet Union over the best form of government
- couple caught spying for the Soviet Union during the Cold War; sentenced to death
- group responsible for September 11 attacks
18 Clues: US President at the end of the Cold War • airport security agency started after 9/11 • group responsible for September 11 attacks • leader of the Soviet Union at the start of the Cold War • name of drills used to practice response to nuclear attack • prior to 9/11, worst terrorist attack in US occurred in this city • ...
6.03 Words 2015-06-15
Across
- really difficult puzzle or riddle
- worldwide, comprehensive
- to dry up, to shrivel, to lose freshness
- gunfire, explosions, attack, blasts
- to make really really mad
- false, unreal image (magic!)
- to satisfy thirst
- variety, mix, lots of similar but different things
- to brag in a bad way, to take someone else down when you do well
Down
- someone who dislikes people that are different
- herb, spice, wise person, smart person
- sacred promise
- landscape
- to provide a reason for doing something (runner wanting to win)
- to lie in wait and attack
- chosen, picked, selected
- peace lover, against war
- a line of people
- job
- to keep within limits, to confine
20 Clues: job • landscape • sacred promise • a line of people • to satisfy thirst • worldwide, comprehensive • chosen, picked, selected • peace lover, against war • to lie in wait and attack • to make really really mad • false, unreal image (magic!) • really difficult puzzle or riddle • to keep within limits, to confine • gunfire, explosions, attack, blasts • herb, spice, wise person, smart person • ...
Megan Strait Cyber Security Crossword 2023-04-20
Across
- locks computer until ransom is paid.
- “bring your own device”.
- network of computers for cyberattacks.
- “UI redress attack”.
- malware appears harmless - malicious actions.
- secures data on cloud infrastructure.
- fake email - provides sensitive information.
- built-in security feature operating systems.
- IT software - protects against threats.
- unknowingly transmits private user information.
- protects data during encryption process.
- scrambling data - authorized users can access.
Down
- malicious software - damage computer system.
- system protects against unauthorized access.
- attacks unknown vulnerability in software.
- users connect to wireless hotspots.
- Protects against violation of a network.
- distributed denial of service attack.
- cyber-physical systems for high-value environments.
- virtual private network.
20 Clues: “UI redress attack”. • “bring your own device”. • virtual private network. • users connect to wireless hotspots. • locks computer until ransom is paid. • secures data on cloud infrastructure. • distributed denial of service attack. • network of computers for cyberattacks. • IT software - protects against threats. • Protects against violation of a network. • ...
DFA 2022-08-16
Across
- American motion-picture industry
- what we all are in the game
- the scene we want to skip the most
- device for use in attack
- expert skill or knowledge
- the game we all play
- the final
- large soaring bird of prey
- a sudden attack on the enemy
- the fourth letter of the Greek alphabet
- something that happens in game that shouldn't
Down
- where you will find lots of animals
- qdpistols
- a regular tuesday night
- something that occurs in a certain place
- 3rd president of the U.S. 1801–09
- a girls name
- a centre of operations
- an intensive search for a person
- equipme used while being carried on the back
20 Clues: qdpistols • the final • a girls name • the game we all play • a centre of operations • a regular tuesday night • device for use in attack • expert skill or knowledge • large soaring bird of prey • what we all are in the game • a sudden attack on the enemy • American motion-picture industry • an intensive search for a person • 3rd president of the U.S. 1801–09 • ...
DFA 2022-08-16
Across
- American motion-picture industry
- what we all are in the game
- the scene we want to skip the most
- device for use in attack
- expert skill or knowledge
- the game we all play
- the final
- large soaring bird of prey
- a sudden attack on the enemy
- the fourth letter of the Greek alphabet
- something that happens in game that shouldn't
Down
- where you will find lots of animals
- qdpistols
- a regular tuesday night
- something that occurs in a certain place
- 3rd president of the U.S. 1801–09
- a girls name
- a centre of operations
- an intensive search for a person
- equipment used while being carried on the back
20 Clues: qdpistols • the final • a girls name • the game we all play • a centre of operations • a regular tuesday night • device for use in attack • expert skill or knowledge • large soaring bird of prey • what we all are in the game • a sudden attack on the enemy • American motion-picture industry • an intensive search for a person • 3rd president of the U.S. 1801–09 • ...
"Letter from Birmingham Jail" Vocabulary 2022-12-03
Across
- Rejected as untrue or unjust
- Of or concerning a province of a country
- Writer's attitude towards a subject
- An attack in return for a similar attack
- To agree
- Unrestrained or uninhibited
- Self satisfied
- Loud and clear
- Making a show of being superior to others
- Seemingly absurd or contradictory
- To warn or reprimand someone
Down
- Incapable of being corrected
- People who annoy or provoke
- Aware or conscious of
- The art of persuasive speaking or writing
- Reference to someone or something from history
- Repetition of the first consonant sound
- Use of the same word or phrase multiple times
- Deep insight
- A temporary suspension of activity
20 Clues: To agree • Deep insight • Self satisfied • Loud and clear • Aware or conscious of • People who annoy or provoke • Unrestrained or uninhibited • Incapable of being corrected • Rejected as untrue or unjust • To warn or reprimand someone • Seemingly absurd or contradictory • A temporary suspension of activity • Writer's attitude towards a subject • Repetition of the first consonant sound • ...
Minecraft Mobs Crossword 2024-06-27
Across
- Zombie riding a chicken is called Chicken _____
- The colour of Enderman
- The type of mobs that never attack
- Snowman with a pumpkin head is named Snow ____
- All black, sword, called Wither _______
- Hostile Mobs always
- A type of Boss Mob that has wings, named Ender ____
Down
- Some mobs will try to hurt and ____ you
- ____ Mobs that are meant to be fought in the end game
- Name of Neutral Pig Mob with a sword
- The type of mobs that only attack when they have a good reason
11 Clues: Hostile Mobs always • The colour of Enderman • The type of mobs that never attack • Name of Neutral Pig Mob with a sword • Some mobs will try to hurt and ____ you • All black, sword, called Wither _______ • Snowman with a pumpkin head is named Snow ____ • Zombie riding a chicken is called Chicken _____ • A type of Boss Mob that has wings, named Ender ____ • ...
Until 18 Calculations 2020-05-11
20 Clues: jaht • kogu • kasutu • võrdne • liitma • korvike • ründama • graafik • teenima • nädalane • riidepuu • möirgama • lahutama • arvestus • sissetulek • hoiupõrsas • šhokolaadi • kulutus, kulu • Kahekordistama • lapsehoidjaks olema
Unit 18 calculations 2020-05-11
21 Clues: ahne • ihne • jaht • valem • liitma • kasutu • võrdne • graafik • õpilane • korvike • kulutus • ründama • lahutama • arvestus • keskmine • nädalane • antiloop • möirgama • arvestama • sissetulek • väga vihane
Regular Verbs 2020-08-05
21 Clues: pedir • sumar • llegar • hervir • lograr • atacar • admitir • hornear • admirar • aprovar • aceptar • adoptar • asistir • permitir • anunciar • apreciar • deacuerdo • aconsejar • preguntar • argumentar • comportarse
1A unit 3 EN-NL 2019-03-10
20 Clues: art • cab • wide • bone • teeth • owner • torch • chain • plenty • strict • attack • clever • crowded • covered • bathtub • wrinkly • doorstep • Chemistry • tour guide • polar bear
Learn English Through Stories 2024-05-08
20 Clues: grab • nest • miss • sadly • image • blame • throw • chance • attack • naughty • explode • happily • directed • complete • deceived • destruction • disdainfully • spend effort • combine forces • disappointment
Lisa 1 Unit 1 2023-03-01
20 Clues: Fuß • Licht • Symbol • Aufzug • Spitze • Gelände • Skyline • Zentrum • Theater • Attacke • Hoffnung • Baseball • Stadteil • besonders • Spitzname • Milliarde • Einwanderer • bestbestuhlt • Veranstaltung • Sammlungen, Kollektion
1-20 (4000 words) 2022-05-13
20 Clues: ดี • มาก • ล่า • ตอบ • กลาง • ซ่อน • ฉลาด • โกรธ • กลัว • มาถึง • โจมตี • สัญญา • ยินดี • โหดร้าย • ปลอดภัย • ในที่สุด • ด้านล่าง • เคล็ดลับ • เห็นด้วย, เห็นฟ้อง • ขณะนั้น,ชั่วครู่,ขณะ,
The castle 2025-12-01
20 Clues: лук • враг • враги • крыша • замок • шумиха • павлин • жарить • кто-то • особый • король • арбалет • пахнуть • королева • кольчуга • атаковать • boy конюх • оружейник • безопасный • остатки, крошки
esperanza reenace 2022-04-20
20 Clues: raid • mock • dawn • bills • folds • anger • sighs • cloud • plains • fields • attack • Lilies • Hairpins • trenches • pinnacle • Mesquite • barbed wire • Immigracion • Lace covering • irrigation ditch
Crucigrama 2013-01-13
21 Clues: Flu • Cold • Cure • Rash • Scar • Bump • Pain • Fever • Pills • Doctor • Cancer • Healer • Sprain • Dentist • Illness • Apsirin • Hospital • Oculista • Medicine • Antibiotics • Heart Attack
The Diary of Anne Frank 2015-02-02
20 Clues: joy • evil • hate • angry • shock • attack • sneaky • anxiety • instinct • horrified • miserable • bothering • luxuriate • unbearable • restrained • wild uproar • nourishment • dictatorship • understanding • unjust treatment
Unit 15-16 Crossword 2024-05-23
kpl 9 2022-05-10
20 Clues: laki • laiha • voima • kohde • oikeus • jatkaa • pahuus • yhteisö • kieltää • liittyä • hyökätä • koulutus • seuraava • nimittää • kaukainen • taistella • poliitikko • laiminlyödä • epätodennäköinen • Taliban Taliban-liike
Gilgamesh vocab cosi 2024-10-30
22 Clues: blue • wall • blue • tired • attack • marrage • verysad • confused • badsmell • fastwater • keepgoing • therefore • todestroy • loudnoice • armslength • go quickly • dissrespect • thrownabout • painfulmoving • deadbodyplace • largemovingthing • assumingpowerwithoutreason
List 3 & 4 2025-01-14
20 Clues: kind • wise • annoy • swell • proper • loving • stupid • attack • confirm • examine • dramatic • ridicule • peaceful • brilliant • explosive • accelerate • productive • instructive • side by side • inharmonious
McGraw Hill WW2 Vocab Crossword 2024-02-08
Across
- the process of completely breaking up into pieces
- seeking to control all aspects of life through dictatorial control
- hostility toward or discrimination against Jews
- leader who has absolute power and rules a nation by force
- during World War II, a Japanese suicide pilot whose mission was to crash into his target
- a camp where Japanese Americans were held during World War II
- a military blockade
- fast, sudden attack by massed forces
- not siding with either party in a disagreement
Down
- large prison camp used to hold people for political reasons
- the mass slaughter of Jews by the Nazis during World War II
- the attempt to kill an entire population, such as an ethnic group
- giving up military weapons
- to make scarce items available to people on a limited basis
- object of an attack
- the policy of giving in to the demands of others in an effort to keep peace
- protective measures taken by civilians in case of attack
17 Clues: object of an attack • a military blockade • giving up military weapons • fast, sudden attack by massed forces • not siding with either party in a disagreement • hostility toward or discrimination against Jews • the process of completely breaking up into pieces • protective measures taken by civilians in case of attack • ...
CAM 2025 Challenge 2025-09-01
Across
- A type of cyber attack that targets a specific individual or group.
- Always use long and unique _____ for each of your accounts.
- Malware that infects a computer by corrupting or erasing information and sending it to hackers.
- A set of rules that control access to a network.
- A person who breaks into system
- A type of malware that replicates itself to spread.
- A type of cyber attack that tricks people into giving up information.
Down
- A technique used to guess passwords by trying many combinations
- A security flaw in software or hardware.
- A type of attack that floods a website with traffic.
- This sends an email or text when logging in to make sure it is really you.
- A person inside an organisation who poses a security threat.
- Identity check using physical traits.
- A type of software that locks your files and demands payment.
- A small file that tracks your activity on websites.
- Unwanted emails or junk mail
- Private network to make you anonymous on the internet.
17 Clues: Unwanted emails or junk mail • A person who breaks into system • Identity check using physical traits. • A security flaw in software or hardware. • A set of rules that control access to a network. • A small file that tracks your activity on websites. • A type of malware that replicates itself to spread. • A type of attack that floods a website with traffic. • ...
Hamas Fun Facts Crossword 2024-09-25
Across
- They seek to keep control over _________ to keep up Palestine nationist ways.
- What is one of their ideologies?
- what is one example of the communities that help combat Hamas?
- how did they attack the Gaza strip (Israel border)?
- Who founded the Hamas organization?
- what is one thing they used to attack the Gaza strip?
Down
- What area did Hamas attack in October 2023?
- What was Yassin's job before he founded Hamas?
- What was Yassin's job after he founded Hamas?
- Man-portable air defence system
- What country does Hamas refuse to recognize as an independent nation?
- How does Hamas receive funding?
12 Clues: Man-portable air defence system • How does Hamas receive funding? • What is one of their ideologies? • Who founded the Hamas organization? • What area did Hamas attack in October 2023? • What was Yassin's job after he founded Hamas? • What was Yassin's job before he founded Hamas? • how did they attack the Gaza strip (Israel border)? • ...
Abuse 2023-10-23
Across
- type of child abuse
- type of child abuse
- assault including a attack or attempted attack with a weapon, regardless of whether an injury occurred, and an attack without a weapon when serious injuries results
- type of child abuse
- an injury appearing as an area of discolored skin on the body, caused by a blow or impact rupturing underlying blood vessels
- the treatment of mental conditions by verbal communication and interaction
- Any sexual act committed against one's will
Down
- quite not wanting to talk to other people
- the cracking or breaking of a hard object or material
- Exploitation of individuals ages 65 and over
- an unpleasant emotion caused by the belief that someone or something is dangerous
- an assault from a physical attack by an individual against another in which a weapon is not used, and the attack does not result in serious physical injury
12 Clues: type of child abuse • type of child abuse • type of child abuse • quite not wanting to talk to other people • Any sexual act committed against one's will • Exploitation of individuals ages 65 and over • the cracking or breaking of a hard object or material • the treatment of mental conditions by verbal communication and interaction • ...
The Attack On Tokyo 2015-03-01
Across
- gas used in this attack.
- Shinrikyo was one of these.
- system of transportation was attacked.
- has this many side effects.
- many people were injured.
Down
- Warfare/Gas attacks are a form of______.
- is where the attack happened.
- attack was an act of ______.
- Shinrikyo/This was the organization that attacked.
- is this many more times deadly than cyannide.
10 Clues: gas used in this attack. • many people were injured. • Shinrikyo was one of these. • has this many side effects. • attack was an act of ______. • is where the attack happened. • system of transportation was attacked. • Warfare/Gas attacks are a form of______. • is this many more times deadly than cyannide. • Shinrikyo/This was the organization that attacked.
Breathe Easy: A Fun Asthma Crossword! 2025-04-23
Across
- A non-pharmacological intervention to reduce asthma symptoms in allergic patients
- White blood cells involved in allergic asthma response
- Asthma triggered by workplace exposure
- Severe life-threatening asthma attack
- Class of medication providing rapid asthma symptom relief.
- Asthma can be triggered by this tiny air borne substance
- A common sound made when breathing during an asthma attack
Down
- A doctor who specializes in asthma and allergies
- The day dedicated to raising awareness about asthma each year
- A device used to deliver medicine during an asthma attack
- Device that measures airflow in the lungs
- This organ is mainly affected by asthma
12 Clues: Severe life-threatening asthma attack • Asthma triggered by workplace exposure • This organ is mainly affected by asthma • Device that measures airflow in the lungs • A doctor who specializes in asthma and allergies • White blood cells involved in allergic asthma response • A device used to deliver medicine during an asthma attack • ...
Cisco Security 2016-03-15
Across
- First half of a login
- Malicious intent hacker (2 words)
- Cisco team who manages receipt, investigation and reporting of security vulnerabilities
- First line of defense. Uses safe libraries, length checks, whitelists (2 words)
- Attack which denys a machine or resource to intended users. (ABBR)
- Monitored isolated data designed to study attack methods
- "Security has to happen at the _________" - John Chambers
- Known for fuzzing tools for software crash testing
Down
- Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL _____
- Development process Cisco uses to increase resiliency and trustworthiness.
- Psychological manipulation of people to perform actions or divulge security info (2 words)
- Hacker with protective intent (2 words)
- Type of security including locked doors, badge readers and surveillance cams
- _____-_____ Cracking method trying every possible combination
- Attack which overwrites buffers boundary and adjacent memory
15 Clues: First half of a login • Malicious intent hacker (2 words) • Hacker with protective intent (2 words) • Known for fuzzing tools for software crash testing • Monitored isolated data designed to study attack methods • "Security has to happen at the _________" - John Chambers • Attack which overwrites buffers boundary and adjacent memory • ...
Volleyball 2020-03-30
Across
- a slang term for “block.”
- a soft hit attack used to get the ball over the net quickly
- an attack shot taken at an extreme angle
- when a hitter pushes the ball off of the opposing block so it lands out of bounds
- a common term for forearm passing
- when the ball is sent over the net in front of a
- when players from opposing teams play the ball simultaneously
- the marks that serve as boundaries of a court
- a successful spike attack
Down
- the last name of the creator of volleyball
- passing or setting the ball to a teammate
- a violation of the rules
- a game with two players on each side
- The original name of the game of volleyball, created by William Morgan
- the name of the sport that we are studying
15 Clues: a violation of the rules • a slang term for “block.” • a successful spike attack • a common term for forearm passing • a game with two players on each side • an attack shot taken at an extreme angle • passing or setting the ball to a teammate • the last name of the creator of volleyball • the name of the sport that we are studying • ...
Chapter's 1-5 Test 2025-11-09
Across
- The very first virus ever detected.
- Driving and looking for wireless networks to hack.
- Software that monitors your system.
- A program that self-replicates.
- An attack that uses a victim's own network routers to perform a DoS attack.
- The protocol used to send email, often on port 25.
- The protocol that translates web addresses into IP addresses.
Down
- The most common type of cable used in most networks (abbreviation).
- A small file that contains data and is stored on your computer.
- Software that has some malicious purpose.
- An attack launched from several machines simultaneously (abbreviation).
- The term for hacking a phone system.
- The type of connector used with network cables.
- A device used to connect two or more networks.
- The protocol used for remotely logging on to a computer in a secure manner.
15 Clues: A program that self-replicates. • The very first virus ever detected. • Software that monitors your system. • The term for hacking a phone system. • Software that has some malicious purpose. • A device used to connect two or more networks. • The type of connector used with network cables. • Driving and looking for wireless networks to hack. • ...
Naruto Ninjutsu 2023-07-28
Across
- - Control over puppets in combat.
- - Fire-based projectile attack.
- - Enhanced version of Rasengan.
- - Eye technique with enhanced perception.
- - Space-time ninjutsu for instant teleportation.
- - Black flames that burn everything.
- - Lightning-based technique.
- - Brings creatures or objects to the battlefield.
Down
- - Healing and regenerative techniques.
- - Forms a dragon made of water.
- - Quick body replacement technique.
- - Changes the user's appearance.
- - Powerful spinning attack.
- Clone - Creates multiple copies of the user.
- - Dimensional teleportation ability.
15 Clues: - Powerful spinning attack. • - Lightning-based technique. • - Forms a dragon made of water. • - Fire-based projectile attack. • - Enhanced version of Rasengan. • - Changes the user's appearance. • - Control over puppets in combat. • - Quick body replacement technique. • - Dimensional teleportation ability. • - Black flames that burn everything. • ...
PIRATES 2019-11-26
19 Clues: OR • ILE • EPEE • CÔTE • CANON • ARGENT • TRESOR • COFFRE • CACHER • NAVIRE • DRAPEAU • DEVENIR • ATTAQUER • CARAÏBES • PISTOLET • COMBATTRE • SQUELETTE • VETEMENTS • CACHE OEIL
DFA 2022-08-16
Across
- American motion-picture industry
- what we all are in the game
- the scene we want to skip the most
- device for use in attack
- expert skill or knowledge
- the game we all play
- the final
- large soaring birds of prey
- a sudden attack on the enemy
- the fourth letter of the Greek alphabet
- something that happens in game that shouldn't
Down
- where you will find lots of animals
- qdpistols
- a regular tuesday night
- something that occurs in a certain place
- 3rd president of the U.S. 1801–09
- a girls name
- a centre of operations
- an intensive search for a person
- equipme used while being carried on the back
20 Clues: qdpistols • the final • a girls name • the game we all play • a centre of operations • a regular tuesday night • device for use in attack • expert skill or knowledge • what we all are in the game • large soaring birds of prey • a sudden attack on the enemy • American motion-picture industry • an intensive search for a person • 3rd president of the U.S. 1801–09 • ...
Medical Emergencies 2019-09-23
Across
- Abnormally increased concentration of glucose in blood
- sensation or motor phenomenon that marks onset of epileptic attack
- Nosebleed
- Device provides external electrical shock to restore normal rhythem and rate
- Separation of layers of a surgical wound
- Forcible expulsion of contents in stomach
- Bodily injuries
- Disorganized cardiac rhythm
- Abnormal drowsiness
Down
- Hives
- Artificial substitution of heart and lung action
- Temp. suspension of consciousness, faint
- Stroke or brain attack
- disturbance caused by failure of circulatory system
- Sudden stoppage of cardiac output
- Paleness
- Unpleasant sensation, often culminating in vomiting
- Escape of blood from the vessels
- Illusion of movement
- Unexpected occasion
- Abnormally decreased glucose in blood
21 Clues: Hives • Paleness • Nosebleed • Bodily injuries • Unexpected occasion • Abnormal drowsiness • Illusion of movement • Stroke or brain attack • Disorganized cardiac rhythm • Escape of blood from the vessels • Sudden stoppage of cardiac output • Abnormally decreased glucose in blood • Temp. suspension of consciousness, faint • Separation of layers of a surgical wound • ...
14 and 15 2020-12-24
Across
- to give in without protest or enthusiasm
- one that precedes
- an angry argument
- to belittle
- of, relating to, or befitting a son or daughter
- to intervene; to put between
- seemingly carefree
- to yield; to transfer
- the main shock of a blow or attack
- to release from the guilt or penalty of
Down
- advanced in a particular art or science
- to bring about quickly or suddenly
- a happy lighthearted character
- to attack violently
- to moderate the intensity of
- to set right; to remedy
- a formation of massed soldiers
- to besiege or surround with troops
- belonging to a thing by its essential nature
- a feeling of distress or embarassment
20 Clues: to belittle • one that precedes • an angry argument • seemingly carefree • to attack violently • to yield; to transfer • to set right; to remedy • to moderate the intensity of • to intervene; to put between • a happy lighthearted character • a formation of massed soldiers • to bring about quickly or suddenly • to besiege or surround with troops • the main shock of a blow or attack • ...
Vocabulary Words from The Letter from Birmingham Jail 2021-02-06
Across
- to cause
- uselessness
- church
- call a demand for action
- to deny
- relating to existence
- temporary end
- hidden
- impossible to separate
- people who do not fit in
- killing of infants
- to agree
- Greek philosopher
- an attack in return for a similar attack
- to warn gently but seriously
- defender a great defender
- concerning regions
Down
- law
- to question
- suggesting that bad is going to happen
- certain to happen
- a particular time in history
- satisfied with oneself
- aware of
- attempting to appear mutually superior
- not strict enough
- wealthy
- shared
- contradictory
- quo the existing state of things
- to treat with disrespect
31 Clues: law • church • hidden • shared • to deny • wealthy • to cause • aware of • to agree • to question • uselessness • temporary end • contradictory • certain to happen • not strict enough • Greek philosopher • killing of infants • concerning regions • relating to existence • satisfied with oneself • impossible to separate • call a demand for action • people who do not fit in • to treat with disrespect • ...
March vocab 2021-03-25
Across
- proud and joyful
- the main subject who is talking or writing
- To embarrass someone
- able to work successfully
- to make an attack due to a previous attack
- Increase steadily and quickly
- to have mixed feeling about someone or something.
- you can touch something.
- To give accusations
- to waste something especially money or time
- to do something carefully
Down
- wide spread area
- make belief like if something where to happen.
- bringing good profits in.
- get something from someone
- the act of implying something
- to be reliable and trust worthy
- to be no longer useful or needed
- to get rid of pain
- to try to scare someone
20 Clues: wide spread area • proud and joyful • to get rid of pain • To give accusations • To embarrass someone • to try to scare someone • you can touch something. • bringing good profits in. • able to work successfully • to do something carefully • get something from someone • the act of implying something • Increase steadily and quickly • to be reliable and trust worthy • ...
Chasing lincoln's Killer Crossword Puzzle 2021-11-08
Across
- resulting in death
- a person with whom one shares a
- hidden
- a person who takes part in a secret plot to cause harm
- sad, somber
- well-spoken
- someone trying to avoid arrest
- light or lighting
- very wet
Down
- a person who has escaped from a place or is in hiding,
- someone who is chasing someone or something
- the friendly and generous welcoming of strangers or guests
- talking; conversation
- to murder an important person in a surprise attack
- a surprise attack by people who were hidden
- the fastest pace of a horse
- made very angry
- lies or trickery
- an organized search for someone, especially a criminal
- incredibly tired
20 Clues: hidden • very wet • sad, somber • well-spoken • made very angry • lies or trickery • incredibly tired • light or lighting • resulting in death • talking; conversation • the fastest pace of a horse • someone trying to avoid arrest • a person with whom one shares a • someone who is chasing someone or something • a surprise attack by people who were hidden • ...
Earn 20 Stars 2023-02-03
Across
- YOU EARN THIS FROM TOURNAMENTS
- THE MOST HANDSOME MAN
- COMES BEFORE SPEED AND POWER
- HOW TO EARN YOUR NEW BELT
- YOU START SPARRING WITH THIS BELT
- 4TH DAN OR HIGHER
- BELIEVE IN YOURSELF
- DELICIOUS CHICKEN
- CROUCHING TIGER, HIDDEN _ _ _ _ _ _
- YOU WEAR THIS TO CLASS
- ATTACK WITH YOUR FOOT
Down
- YOU ARE NOT THIS
- YOUR TRAINING
- HOW TO GET IMPROVE IN SOMETHING
- SPARRING GEAR FOR YOUR HEAD
- ATTACK WITH YOUR FIST
- YOUR FIRST BELT
- NAME OF YOUR SCHOOL
- PRACTICE FIGHTING
- YOU DONT DO THIS IN MARTIAL ARTS
- AGE 4 - 6 YEARS OLD
- 1 WEEK OF CAMP IN MARCH
- ADULTS NEED THIS IN THE MORNING
- BLOOD, SWEAT, & _ _ _ _ _
24 Clues: YOUR TRAINING • YOUR FIRST BELT • YOU ARE NOT THIS • PRACTICE FIGHTING • 4TH DAN OR HIGHER • DELICIOUS CHICKEN • NAME OF YOUR SCHOOL • BELIEVE IN YOURSELF • AGE 4 - 6 YEARS OLD • ATTACK WITH YOUR FIST • THE MOST HANDSOME MAN • ATTACK WITH YOUR FOOT • YOU WEAR THIS TO CLASS • 1 WEEK OF CAMP IN MARCH • HOW TO EARN YOUR NEW BELT • BLOOD, SWEAT, & _ _ _ _ _ • SPARRING GEAR FOR YOUR HEAD • ...
The Miracle Worker 2014-10-16
Across
- Helps calm down Helen in the garden house.
- Helen's brother.
- A cruel ruler
- What did Mr.Anagnos give Annie before she left.
- To return an attack in a similar way.
- A present from Helen's teacher.
- What state do the Kellers live in?
- To be caused by.
- The main servant in the Keller household.
- Helen is _____ so she can't hear.
Down
- Helen's mother.
- Slowness in a revealing motion
- Helen's first word was.
- Helen's teacher.
- Slightly turned away.
- Helen used these to attack Martha
- Helen's father is referred to as ______ Keller.
- Annie takes Helen to the ______ house for two weeks.
- Helen Keller is ______ so she can't see.
- Very small.
20 Clues: Very small. • A cruel ruler • Helen's mother. • Helen's brother. • Helen's teacher. • To be caused by. • Slightly turned away. • Helen's first word was. • Slowness in a revealing motion • A present from Helen's teacher. • Helen used these to attack Martha • Helen is _____ so she can't hear. • What state do the Kellers live in? • To return an attack in a similar way. • ...
Conditions quiz 2015-01-27
Across
- common side effect of meds
- hayfever 1 of 3 words
- second word of heart attack
- you might take omeprazole for this
- low iron leves
- maybe be ventricular or supraventricular
- when you just can't go!
- clot
- you might be prescribed Cialis for this
- 2 of 3
- second part of helci
- infection of renal outlet
- 3 of 3
Down
- breast pain
- low BP
- a viral infection spread by coughing/sneezing
- when heart stops 7,6
- first part of an infection that can cause gastric ulcer
- you might take vermox for this 5,5
- first word of heart attack
- you might take indinavir for this
21 Clues: clot • low BP • 2 of 3 • 3 of 3 • breast pain • low iron leves • when heart stops 7,6 • second part of helci • hayfever 1 of 3 words • when you just can't go! • infection of renal outlet • common side effect of meds • first word of heart attack • second word of heart attack • you might take indinavir for this • you might take omeprazole for this • you might take vermox for this 5,5 • ...
AP US history crossword puzzle 2022-05-16
Across
- US Attack Germany in france
- Supreme court judicial
- split of colonies from GB
- Made factory jobs numbing
- Death of the barter system
- US wont tolerate colonization
- Long drought and poor crops
- Germany contacting Mexico
- Transport system Est and Wst
- attempt at constitution
Down
- Nixon trying to find results
- count slaves as part person
- 1930 terrible Economic crash
- Transfer of Slaves To US
- separate unconstitutional
- war over slavery
- 1930s programs to fix crash
- Worst US president ever
- Japanese attack on US WW2
- Moved south for invention
20 Clues: war over slavery • Supreme court judicial • Worst US president ever • attempt at constitution • Transfer of Slaves To US • split of colonies from GB • Made factory jobs numbing • separate unconstitutional • Japanese attack on US WW2 • Germany contacting Mexico • Moved south for invention • Death of the barter system • count slaves as part person • US Attack Germany in france • ...
