IIT327-2 Quiz 2

123456789
Across
  1. 4. Activity involving the exploration of computer or network ports to identify potential vulnerabilities
  2. 5. The process of identifying, assessing, and prioritizing risks to an organization's assets.
  3. 6. A set of rules or guidelines that define the acceptable use and security measures within an organization.
  4. 7. A process of thorough examination and analysis to ensure information security compliance
  5. 8. Decoy systems designed to attract and detect unauthorized access attempts.
  6. 9. Secure network for internal communication and collaboration within an organization
Down
  1. 1. The process of identifying and analyzing vulnerabilities in computer systems, networks, or applications.
  2. 2. A network security device that monitors and controls incoming and outgoing network traffic.
  3. 3. Incorrect identification of a harmless activity or file as malicious.
  4. 6. A firewall that acts as an intermediary between internal network clients and external servers.