Prep
Across
- 1. A regulation to protect Personal Health Information.
- 3. SIEM engine that gathers logs from security devices.
- 5. Mimicking a switch to gain trunk link access (Two words, no space)
- 6. Network strategy for high availability
- 7. Password attack uses wordlist.
- 11. An intrusive vulnerability scan used to find deep-level vulnerabilities on a host.
- 20. They can store keyboard keystrokes.
- 21. Streams of updated threat information (Two words, no space)
- 23. Science of analyzing digital evidence (Two words, no space)
- 24. A software designed to collect security logs
- 26. Maximum acceptable data loss
- 28. Intrusion Prevention System (Three letters)
- 29. Security alerts, and announcements
- 31. NAC component enforcing security requirements
- 32. Evidence of malicious activity
- 33. Site redudncnacy without active equipment
- 34. A password hacking tool.
- 36. Incident response strategy to isolate the damage.
- 39. Incorrectly identifying harmless traffic as malicious (Two words, no space)
- 41. Has the third priority in incident data capture volatility.
- 42. Network isolation technique (Two words, no space)
- 43. Used to prioritize the vulnerabilities.
- 45. Controlling the network access mechanism on a router, MLS or firewall
- 48. Physical security control with interlocking doors
- 51. Data security technique focusing on hiding original values
- 52. Stores configuration objects in an AD
- 57. Science of analyzing digital evidence (Two words, no space)
- 58. Web attack injecting malicious scripts
- 59. Ensuring message origin cannot be denied
- 61. Rapidly depleting IP addresses from a server (Two words, no space)
- 64. Attack exploiting excessive data input in memory (Two words, no space)
- 68. System logging protocol
- 69. These log types are used to identify VOIP-related events.
- 70. Secure storage for original payment account numbers
- 74. Acceptable downtime after an incident
- 75. A command used to crack a hashed password.
- 76. Pretending to be the root to manipulate the spanning tree (Three words, no space)
- 78. Detection system for a network
- 79. Good backup solution if RTO is not the objective.
- 82. Document defining the targets and objectives of pentesting.
- 83. Plan for business continuity after a major disruption (Two words, no space)
- 84. Contains a series of instructions that the machine performs to respond to incidents.
- 85. Distrupting the network resources. Making them unavailable.
- 86. Vulnerability scan that actively probes systems
- 87. Contains routing and sender information of an email (metadata)
- 88. Security control to fix vulnerabilities
- 89. A tool or software used to prevent changes from being accidentally made to the storage device.
- 90. Hypothetical scenario discussion and exercise in the IRP prep phase
Down
- 1. Urgent software update
- 2. Organized approach to handling security breaches (Two words, no space)
- 4. Unauthorized act of transferring data from a system to another.
- 7. Switch feature to validate ARP packets
- 8. Correctly identifying malicious traffic (Two words, no space)
- 9. Software on an endpoint that assists with compliance checks (Two words, no space)
- 10. A password policy for strong user credentials
- 12. Correctly identifying harmless traffic as harmless (Two words, no space)
- 13. Wireshark is under this tool classification (Two words, no space)
- 14. Collaborative sharing of cyber threat information (Two words, no space)
- 15. Documenting evidence handling (Three words, no space)
- 16. Exploiting VLAN misconfigurations for unauthorized access (Two words, no space)
- 17. This file identifier is used for backups.
- 18. These log types are used to identify incidents.
- 19. Ethical Hacking test with no prior system knowledge (Two words, no space)
- 22. Detection system designed for end devices
- 25. This type of backup has the lowest RTO but higher storage usage
- 27. Gathering information about a target
- 30. Ethical Hacking test with complete system knowledge
- 35. Attack simulation team in Pentesting
- 37. NMAP scan that uses the (-sX) switch.
- 38. Adding random data to password hashes
- 40. Falsified messages link attacker's MAC and IP (Three words, no space)
- 44. Security control to identify incidents
- 46. This table contains a series of calculated hash values.
- 47. Process of bringing non-compliant devices up to standard
- 49. A disk redundancy technique.
- 50. This account policy is an online brute-force saver.
- 53. System to prevent sensitive data from leaving
- 54. A security incident response tool.
- 55. These logs contain all the OS related events.
- 56. Security feature to prevent rogue DHCP servers (Two words, no space)
- 57. Server that redirects malicious DNS requests, mainly used to pinpoint a compromised machine. (Two words, no space)
- 60. Attack exploiting address resolution protocol (Two words, no space)
- 62. Deceptive network to attract attackers
- 63. A popular vulnerability scanner
- 65. A temporary power backup solution.
- 66. Recovering data from unallocated disk space (Two words, no space)
- 67. Data subject to local laws (Two words, no space)
- 71. Replacing sensitive payment data with unique identifiers (Two words, no space)
- 72. Process of updating systems to fix flaws (Two words, no space)
- 73. Failing to detect malicious traffic (Two words, no space)
- 74. Identifying and evaluating potential threats (Two words, no space)
- 77. This SIEM Component analyzes security logs
- 80. The first storage area captured during forensics analysis.
- 81. Requirement for protecting primary account numbers