NSA
Across
- 2. / Windows 2008 has two types of account Local and ___________
- 3. / a device designed to control the flow of traffic into and out-of a network
- 5. / Ping O’ Death is a ___________ attack.
- 6. / Each computer in a DNS domain is uniquely identified by its?
- 7. / Virus scanners must determine the ___________ of the file to determine that it is a virus
- 9. / ___________ Filtering A Technique employed to ensure that incoming packets are from the network they say they are from
- 11. / A group policy that is obtained from a higher level.
- 14. / An attack from many agents.
- 15. / Failing to install and update security patches could lead to a ____ on your system
- 16. / They change their encryption module on replication
Down
- 1. / A built in account
- 4. / Units that mirror your organization's functional or business structure
- 8. / A virus that spreads via Word, Excel, PowerPoint & PDF files
- 10. / A built in account
- 12. / A Syn Flood attack exploits the TCP ________________
- 13. / Software that uses security holes to replicate itself