Midterm Exam Prep

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152
Across
  1. 5. Protecting data and resources from unauthorized access.
  2. 7. This type of denial exists on each ACL.
  3. 9. Security subnet created by dual firewalls.
  4. 10. Sophisticated attacks remain undetected.
  5. 16. A system designed to lure attackers and gather information about their tactics.
  6. 18. A security zone for suppliers and customers.
  7. 20. An attack in which the attacker intercepts and analyzes network traffic.
  8. 21. This type of ACL allows everyone except the one we deny.
  9. 22. Malware inducing fear tactic.
  10. 24. This secure remote access protocol should be replaced by telnet.
  11. 26. Protection of data from unauthorized manipulation or alteration.
  12. 28. Device authentication mechanism to ensure a secure network.
  13. 29. Social engineering on high-profile targets.
  14. 30. It's used for IP translations.
  15. 31. Policies are used for email delivery.
  16. 32. This hacker steals valuable information and is often associated with the mafia.
  17. 35. IPsec protocol that can be used for data encryption.
  18. 36. This hacker gets in, grabs the goods, and gets out.
  19. 37. An availability technique.
  20. 38. Social engineering phase in which the conversation with the victim starts.
  21. 41. This hackers have political motives.
  22. 44. This poisoning technique associates a MAC address with the victim's IP address.
  23. 46. A layer 2 Network segmentation technique.
  24. 47. Provides a method for mutual authentication of devices within the SAN
  25. 48. This WSUS server is responsible for testing and approval of patches.
  26. 50. two worded Layer 2 security configuration on switches.
  27. 51. These malware can be purchased in a ready-to-use state.
  28. 52. Social engineering over the phone.
Down
  1. 1. For this anti-virus scan, you must reboot your system.
  2. 2. A physical security entry trap
  3. 3. Storytelling and impersonating legitimate organization.
  4. 4. In this NIST core function we educate users.
  5. 6. This standard can be created to apply consistent security configurations.
  6. 8. FTPs rely on this protocol for security.
  7. 11. The second Security model layer.
  8. 12. In this NAC stage we define how NAC should be implemented.
  9. 13. This Malware spreads through a network.
  10. 14. Infected computers with a botnet to carry an attack with.
  11. 15. These appliances can be used to apply quality of service and traffic-shaping.
  12. 17. IPsec protocol is responsible for establishing security associations (SAs).
  13. 19. Ethical hacking phase to collect information.
  14. 23. The best security countermeasure to reduce the risk of a phishing attack.
  15. 25. A controlled DNS to identify a hacked computer.
  16. 27. This IPsec operation mode is used for site-to-site VPN connection.
  17. 31. Protects sensitive data from being exposed
  18. 33. Email authentication check.
  19. 34. The file and folder permissions are written in this list.
  20. 38. Email authentication using signatures.
  21. 39. File-level encryption.
  22. 40. Following an authorized personnel to bypass the physical Access Control.
  23. 42. This type of proxy server can be used for web filtering.
  24. 43. A temporary power backup.
  25. 45. A network scanning tool.
  26. 49. These patches are prioritized even outside of a normal schedule.