exam

1234567891011121314151617181920
Across
  1. 3. The main circuit board that connects all components of a computer.
  2. 4. The abbreviation for the security measure where more than one verification method is used to access a system.
  3. 7. Type of software that allows the operating system to communicate with and control hardware components.
  4. 8. This abbreviation is used for the type of highspeed, temporary memory used for processing tasks.
  5. 9. The practice that guarantees that authorized users have access to information and systems when needed.
  6. 11. Protection of information systems from theft, damage, or disruption.
  7. 13. The process of converting data into a code to prevent unauthorized access.
  8. 14. key, A cryptographic key used in asymmetric encryption that must be kept secret.
  9. 16. An electronic device that processes data according to instructions.
  10. 20. The study and practice of securing communication through encoding techniques.
Down
  1. 1. Malicious software designed to damage or gain unauthorized access to systems.
  2. 2. The practice that ensures information is secret, secure and accessible only to those authorized to have access.
  3. 5. The abbreviation for the security measure that encrypts internet connections for secure data transmission over a public network.
  4. 6. Type of software programmed into read-only memory to provide low-level instructions that control hardware devices.
  5. 10. The practice that assures that data is accurate and has not been altered or tampered with.
  6. 12. This abbreviation is used for the specialized processor that handles rendering of images, video and animation.
  7. 15. point, A device that allows wireless devices to connect to a wired network.
  8. 17. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  9. 18. The physical or logical arrangement of network devices and connections.
  10. 19. A security test used to verify that a user is human and not a bot.