Block 5 Unit 2
Across
- 2. Verifying you are who you say you are.
- 6. Responsible for collecting traffic from a particular segment for analysis.
- 8. Used to automate processes on a computer.
- 9. Process preventing someone from booting up a different OS to gain access.
- 10. Legacy authentication service for Unix systems.
Down
- 1. Taking measures to prevent security issues in the first place.
- 3. Stored on client computers containing user preferences and logon info.
- 4. Converts data into an unreadable format.
- 5. This NAC does not require software to be installed on a client.
- 7. Each sprint contains all the phases of this SDLC model.