Brain-Riddle Round 2

123456789101112131415
Across
  1. 4. A team that monitors and defends against cyber threats.
  2. 5. The data sent back from a server after a request.
  3. 12. A method of hiding data within other files.
  4. 14. A file containing code for automation.
  5. 15. A program where hackers get paid for finding security flaws.
Down
  1. 1. A security feature that controls web resource access.
  2. 2. Temporary storage that speeds up data retrieval.
  3. 3. A remote computing device that communicates with a network.
  4. 6. A temporary interaction between a user and a website.
  5. 7. A network utility used to test connectivity.
  6. 8. A lightweight data format used for data exchange.
  7. 9. A type of attack that tricks users into executing unwanted actions.
  8. 10. The part of a cyber attack that carries malicious code.
  9. 11. A process of converting data into a fixed-size value.
  10. 13. A communication endpoint for network connections.