Kyle McKinney's Chapter 15 Puzzle
Across
- 2. You might use this extinguisher on a grease fire.
- 7. ______________ control is in place to stop the spread of damage and prevent loss of data.
- 9. Foraging for private information in often unsanitary receptacles.
- 10. Protects computers from intermittent data loss.
- 12. Diverting a delivery to gain access to goods.
- 15. Examples include your DL# and credit card information
- 16. The removal of a threat.
- 18. A attempt to obtain private information via verification e-mails.
Down
- 1. In order to audit an IT manager, a company may ask him to take a __________ vacation.
- 3. Watching as someone enters a password or PIN.
- 4. An expensive chemical sometimes used in server room extinguishers.
- 5. This type of sprinkler system might have heads with glass bulbs.
- 6. Leaving a USB drive, infected with malware, in plain site.
- 8. Rules to restrict how a computer is used.
- 11. ___ rotation involves two or more employees switching roles.
- 12. Incineration of storage media.
- 13. Transient electromagnetic pulse emanations standard
- 14. Soundproofing is a common way to prevent this.
- 17. Degaussing a disk or overwriting data with bit-level software.