Final Review

12345678910111213141516171819202122232425262728293031323334353637383940414243
Across
  1. 3. Encompasses the recovery, investigation, examination, and analysis of material found in digital devices during incidents.
  2. 6. Security team that manages an organization's network defense.
  3. 7. Type of RFID tag can send a signal over a long distance.
  4. 9. Provides the network virtualization solution called XenServer.
  5. 10. type of interference is caused by motors, heavy machinery, and fluorescent lights.
  6. 11. The most volatile memory in the gathering of potential evidence.
  7. 13. An security system that identifies any attacks. In addition, takes immediate action to stop or prevent the attack.
  8. 15. Backup strategy backs up all files from a computer's file system.
  9. 16. Cloud computing solutions delivers software applications to a client.
  10. 17. Used as a secure tunnel to connect two networks.
  11. 20. This layer of SDN communicates with the Control layer through what is called the northbound interface.
  12. 21. Password attack employs a list of pre-defined passwords that it tries against a login prompt.
  13. 22. Message authentication code that allows a user to verify that a file or message is legitimate.
  14. 24. Type of wireless access point is generally used in a residential setting.
  15. 26. sends unsolicited business cards and messages to a Bluetooth device.
  16. 28. Process of adding random characters at the beginning or end of a password to generate a completely different hash.
  17. 30. An exploit in which malware allows the virtual OS to interact directly with the hypervisor.
  18. 32. Protocol for logging.
  19. 36. An attack that injects malicious scripts into web pages to redirect users to fake websites to gather personal information.
  20. 38. A PKI is an implementation for managing which type of encryption.
  21. 39. Dumpster diving is this type of reconnaissance.
  22. 40. One of the most popular packet capturing tools.
  23. 43. Rights management category is applied to music, videos, and software that is sold to consumers.
Down
  1. 1. Connects multiple servers together so that if one server fails, the others immediately take over its tasks.
  2. 2. Entering random data to the inputs of an application.
  3. 4. Violation of a security policy.
  4. 5. SIEM component that is responsible for gathering all event logs from configured devices.
  5. 8. A Cloud technology that allows cloud services to be shared by several.
  6. 12. DLP method works by replacing sensitive data with realistic fictional data.
  7. 14. A Cloud technology that provides cloud services to just about anyone.
  8. 16. These types of logs are generated when a computer randomly restarts.
  9. 18. (SOAR) system automation components that shows processes and procedures that are to be used by a human.
  10. 19. Tool that can be used to view and modify DNS server information in Linux.
  11. 23. A vulnerability scan method in which administrator logos into a system for scanning.
  12. 25. Used to verify that a downloaded file has not been altered.
  13. 27. Protocol used by IPsec to create a security association between communicating partners.
  14. 28. Cryptography mechanism that hides secret communications within various forms of data.
  15. 29. A Wireless device used to manage multiple access points in your organization.
  16. 31. MOST secure EAP implementation.
  17. 32. used on a wireless network to identify the network name.
  18. 33. passive reconnaissance tool is used to gather information from a variety of public sources.
  19. 34. Computer software, firmware, or hardware that creates and runs virtual machines.
  20. 35. Acronym for a solution that pushes security policies directly to mobile devices over a network.
  21. 37. An SDN layer also known as the Infrastructure layer.
  22. 41. Password attack with a large table of hashes.
  23. 42. Harddrive configuration used for data redundancy.