Chapter 2
Across
- 4. threat actor that seeks to harm the government
- 8. reduce the risk of a threat
- 11. individual who gains unauthorized access
- 14. when different employees take over job tasks
- 15. this privilege principal limits access to work tasks
- 17. after an attack perform a memory
Down
- 1. media preparation technique
- 2. this document states who has had access to the evidence
- 3. this security measure is AKA defense-in-depth
- 5. identifies traffic on your network
- 6. important aspect of evidence gathering
- 7. separation of ___
- 9. testing tool to validate bandwidth
- 10. this testing type simulates a large number of clients
- 12. privileges resulting from of privilege escalation
- 13. are the greatest threat to network security
- 16. changes the position of characters