cis212-in-seat-review-w4
Across
- 2. A logical computer network of zombies.
- 5. Isolated environment use to test potential malware.
- 8. Computer most closely resembles a desktop computer
- 10. Technique to diminish risk level
- 12. The necessary steps to protect a person or property from harm
- 13. Only allows what in on this list.
- 15. The first step in the Cyber Kill Chain
- 16. Addresses general vulnerability
- 19. Where web-based computers store its user files.
- 20. Eliminating as many security risks as possible
- 22. Addresses specific customer situation
- 24. System use to collect attackers techniques
- 25. Rules of conduct and communication
Down
- 1. Microsoft transport protocol
- 3. Another name for Add-on
- 4. Purchasing security products from different vendors
- 6. Unauthorized access through a Bluetooth connection
- 7. Captures and store keystrokes
- 9. Validating individuals credentials
- 11. Enforces the location in which an app can function
- 14. Managing and presenting by function without physical layout or location.
- 17. A set of rules for how Microsoft Windows applications share information
- 18. A large system with many capabilities.
- 21. Designated to analysis network packets
- 23. Impersonating another computer of device