Brain-Riddle Round 2
Across
- 4. A team that monitors and defends against cyber threats.
- 5. The data sent back from a server after a request.
- 12. A method of hiding data within other files.
- 14. A file containing code for automation.
- 15. A program where hackers get paid for finding security flaws.
Down
- 1. A security feature that controls web resource access.
- 2. Temporary storage that speeds up data retrieval.
- 3. A remote computing device that communicates with a network.
- 6. A temporary interaction between a user and a website.
- 7. A network utility used to test connectivity.
- 8. A lightweight data format used for data exchange.
- 9. A type of attack that tricks users into executing unwanted actions.
- 10. The part of a cyber attack that carries malicious code.
- 11. A process of converting data into a fixed-size value.
- 13. A communication endpoint for network connections.