Chapter 8 Security Plus

1234567891011121314151617
Across
  1. 2. Open security standards that can help automate vulnerability management
  2. 5. a threat actor positions themself in the middle between
  3. 6. A session sampling protocol feature on Cisco routers
  4. 7. bogus requests to overwhelm the recipient
  5. 10. A product that consolidates real-time security monitoring and management
  6. 11. helps protect organizations from email spoofing, phishing
  7. 12. closed A failure mode in which the device shuts down when failure is detected
  8. 14. Gathering data for monitoring user behavior
  9. 16. validates the content of the email message
  10. 17. Detecting and notifying operators about meaningful events
Down
  1. 1. attacker to multiply the effect of their attack
  2. 3. Isolating systems that have been compromised
  3. 4. ensure critical data is protected
  4. 8. baseline A standard of normal activities
  5. 9. A standard of normal activities
  6. 13. retains historical documents
  7. 15. Collecting data without the need of monitoring agents