Chapter 8 Security Plus
Across
- 2. Open security standards that can help automate vulnerability management
- 5. a threat actor positions themself in the middle between
- 6. A session sampling protocol feature on Cisco routers
- 7. bogus requests to overwhelm the recipient
- 10. A product that consolidates real-time security monitoring and management
- 11. helps protect organizations from email spoofing, phishing
- 12. closed A failure mode in which the device shuts down when failure is detected
- 14. Gathering data for monitoring user behavior
- 16. validates the content of the email message
- 17. Detecting and notifying operators about meaningful events
Down
- 1. attacker to multiply the effect of their attack
- 3. Isolating systems that have been compromised
- 4. ensure critical data is protected
- 8. baseline A standard of normal activities
- 9. A standard of normal activities
- 13. retains historical documents
- 15. Collecting data without the need of monitoring agents