Chapter 5 CEH Crossword Puzzle
Across
- 2. Tool driven vulnerability detection process
- 7. Verification of user supplied data
- 10. Cloud based vulnerability management platform
- 13. Security testing from outside the network
- 14. Observation without interacting with targets
- 16. List of organizational systems and devices
- 18. Process of determining threat impact level
- 19. Network communication points exposed to access
- 20. Assessment of database security risks
- 22. System used to measure vulnerability severity
- 25. Compromise occurring through external suppliers
- 26. Software weakness exploitable by attackers
- 27. Use of insecure cryptographic protection
- 28. Standard identifier assigned to vulnerabilities
- 30. Testing software for security weaknesses
- 32. Timing issue caused by simultaneous operations
- 33. Web server vulnerability scanning tool
- 34. Device missing security updates
- 36. Process of updating systems to fix vulnerabilities
- 37. Factory settings that reduce system security
- 38. Process of identifying and evaluating security weaknesses
- 40. Automated search for known security flaws
- 42. Scan performed using authorized access
- 45. Examination focused on individual systems
- 46. Approved configuration standard for systems
- 47. Verification method confirming trusted software
- 48. Arithmetic value exceeding storage limits
- 49. Continuous observation for new threats
Down
- 1. Memory overwrite caused by excessive input
- 3. Consumption of system resources causing failure
- 4. Detection of weaknesses in wireless networks
- 5. Security testing within organizational network
- 6. Human performed security testing
- 8. Repository containing vulnerability information
- 9. Execution of malicious library inside process
- 11. Failure to release allocated system memory
- 12. Classification system for software weaknesses
- 15. Document describing discovered security risks
- 17. Direct probing of systems to detect flaws
- 21. Incorrect system or network settings creating risk
- 23. Evaluation and prioritization of discovered weaknesses
- 24. Open source vulnerability management scanner
- 29. Confirmation that security fixes are effective
- 31. Security exposure introduced by vendors
- 35. Management of system error responses
- 39. Actions taken to correct vulnerabilities
- 41. Access attempt to invalid memory location
- 43. Vulnerability scanning assessment tool
- 44. Discovery of services ports and devices