Midterm Exam Prep
Across
- 5. Protecting data and resources from unauthorized access.
- 7. This type of denial exists on each ACL.
- 9. Security subnet created by dual firewalls.
- 10. Sophisticated attacks remain undetected.
- 16. A system designed to lure attackers and gather information about their tactics.
- 18. A security zone for suppliers and customers.
- 20. An attack in which the attacker intercepts and analyzes network traffic.
- 21. This type of ACL allows everyone except the one we deny.
- 22. Malware inducing fear tactic.
- 24. This secure remote access protocol should be replaced by telnet.
- 26. Protection of data from unauthorized manipulation or alteration.
- 28. Device authentication mechanism to ensure a secure network.
- 29. Social engineering on high-profile targets.
- 30. It's used for IP translations.
- 31. Policies are used for email delivery.
- 32. This hacker steals valuable information and is often associated with the mafia.
- 35. IPsec protocol that can be used for data encryption.
- 36. This hacker gets in, grabs the goods, and gets out.
- 37. An availability technique.
- 38. Social engineering phase in which the conversation with the victim starts.
- 41. This hackers have political motives.
- 44. This poisoning technique associates a MAC address with the victim's IP address.
- 46. A layer 2 Network segmentation technique.
- 47. Provides a method for mutual authentication of devices within the SAN
- 48. This WSUS server is responsible for testing and approval of patches.
- 50. two worded Layer 2 security configuration on switches.
- 51. These malware can be purchased in a ready-to-use state.
- 52. Social engineering over the phone.
Down
- 1. For this anti-virus scan, you must reboot your system.
- 2. A physical security entry trap
- 3. Storytelling and impersonating legitimate organization.
- 4. In this NIST core function we educate users.
- 6. This standard can be created to apply consistent security configurations.
- 8. FTPs rely on this protocol for security.
- 11. The second Security model layer.
- 12. In this NAC stage we define how NAC should be implemented.
- 13. This Malware spreads through a network.
- 14. Infected computers with a botnet to carry an attack with.
- 15. These appliances can be used to apply quality of service and traffic-shaping.
- 17. IPsec protocol is responsible for establishing security associations (SAs).
- 19. Ethical hacking phase to collect information.
- 23. The best security countermeasure to reduce the risk of a phishing attack.
- 25. A controlled DNS to identify a hacked computer.
- 27. This IPsec operation mode is used for site-to-site VPN connection.
- 31. Protects sensitive data from being exposed
- 33. Email authentication check.
- 34. The file and folder permissions are written in this list.
- 38. Email authentication using signatures.
- 39. File-level encryption.
- 40. Following an authorized personnel to bypass the physical Access Control.
- 42. This type of proxy server can be used for web filtering.
- 43. A temporary power backup.
- 45. A network scanning tool.
- 49. These patches are prioritized even outside of a normal schedule.