CompTIA Cloud+ Ch. 9
Across
- 2. Tool for filtering network traffic.
- 8. Reviewing logs to identify security issues.
- 9. Adherence to legal and regulatory standards.
- 11. Measures to protect data and systems.
- 12. Securely connects users to a private network.
Down
- 1. Digital document proving identity.
- 3. Replacing sensitive data with non-sensitive equivalents.
- 4. Authentication requiring more than one verification method.
- 5. Encoding data to prevent unauthorized access.
- 6. Ensuring data accuracy and consistency.
- 7. Identity and Access Management.
- 10. Updating software to fix vulnerabilities.