Prep

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990
Across
  1. 1. A regulation to protect Personal Health Information.
  2. 3. SIEM engine that gathers logs from security devices.
  3. 5. Mimicking a switch to gain trunk link access (Two words, no space)
  4. 6. Network strategy for high availability
  5. 7. Password attack uses wordlist.
  6. 11. An intrusive vulnerability scan used to find deep-level vulnerabilities on a host.
  7. 20. They can store keyboard keystrokes.
  8. 21. Streams of updated threat information (Two words, no space)
  9. 23. Science of analyzing digital evidence (Two words, no space)
  10. 24. A software designed to collect security logs
  11. 26. Maximum acceptable data loss
  12. 28. Intrusion Prevention System (Three letters)
  13. 29. Security alerts, and announcements
  14. 31. NAC component enforcing security requirements
  15. 32. Evidence of malicious activity
  16. 33. Site redudncnacy without active equipment
  17. 34. A password hacking tool.
  18. 36. Incident response strategy to isolate the damage.
  19. 39. Incorrectly identifying harmless traffic as malicious (Two words, no space)
  20. 41. Has the third priority in incident data capture volatility.
  21. 42. Network isolation technique (Two words, no space)
  22. 43. Used to prioritize the vulnerabilities.
  23. 45. Controlling the network access mechanism on a router, MLS or firewall
  24. 48. Physical security control with interlocking doors
  25. 51. Data security technique focusing on hiding original values
  26. 52. Stores configuration objects in an AD
  27. 57. Science of analyzing digital evidence (Two words, no space)
  28. 58. Web attack injecting malicious scripts
  29. 59. Ensuring message origin cannot be denied
  30. 61. Rapidly depleting IP addresses from a server (Two words, no space)
  31. 64. Attack exploiting excessive data input in memory (Two words, no space)
  32. 68. System logging protocol
  33. 69. These log types are used to identify VOIP-related events.
  34. 70. Secure storage for original payment account numbers
  35. 74. Acceptable downtime after an incident
  36. 75. A command used to crack a hashed password.
  37. 76. Pretending to be the root to manipulate the spanning tree (Three words, no space)
  38. 78. Detection system for a network
  39. 79. Good backup solution if RTO is not the objective.
  40. 82. Document defining the targets and objectives of pentesting.
  41. 83. Plan for business continuity after a major disruption (Two words, no space)
  42. 84. Contains a series of instructions that the machine performs to respond to incidents.
  43. 85. Distrupting the network resources. Making them unavailable.
  44. 86. Vulnerability scan that actively probes systems
  45. 87. Contains routing and sender information of an email (metadata)
  46. 88. Security control to fix vulnerabilities
  47. 89. A tool or software used to prevent changes from being accidentally made to the storage device.
  48. 90. Hypothetical scenario discussion and exercise in the IRP prep phase
Down
  1. 1. Urgent software update
  2. 2. Organized approach to handling security breaches (Two words, no space)
  3. 4. Unauthorized act of transferring data from a system to another.
  4. 7. Switch feature to validate ARP packets
  5. 8. Correctly identifying malicious traffic (Two words, no space)
  6. 9. Software on an endpoint that assists with compliance checks (Two words, no space)
  7. 10. A password policy for strong user credentials
  8. 12. Correctly identifying harmless traffic as harmless (Two words, no space)
  9. 13. Wireshark is under this tool classification (Two words, no space)
  10. 14. Collaborative sharing of cyber threat information (Two words, no space)
  11. 15. Documenting evidence handling (Three words, no space)
  12. 16. Exploiting VLAN misconfigurations for unauthorized access (Two words, no space)
  13. 17. This file identifier is used for backups.
  14. 18. These log types are used to identify incidents.
  15. 19. Ethical Hacking test with no prior system knowledge (Two words, no space)
  16. 22. Detection system designed for end devices
  17. 25. This type of backup has the lowest RTO but higher storage usage
  18. 27. Gathering information about a target
  19. 30. Ethical Hacking test with complete system knowledge
  20. 35. Attack simulation team in Pentesting
  21. 37. NMAP scan that uses the (-sX) switch.
  22. 38. Adding random data to password hashes
  23. 40. Falsified messages link attacker's MAC and IP (Three words, no space)
  24. 44. Security control to identify incidents
  25. 46. This table contains a series of calculated hash values.
  26. 47. Process of bringing non-compliant devices up to standard
  27. 49. A disk redundancy technique.
  28. 50. This account policy is an online brute-force saver.
  29. 53. System to prevent sensitive data from leaving
  30. 54. A security incident response tool.
  31. 55. These logs contain all the OS related events.
  32. 56. Security feature to prevent rogue DHCP servers (Two words, no space)
  33. 57. Server that redirects malicious DNS requests, mainly used to pinpoint a compromised machine. (Two words, no space)
  34. 60. Attack exploiting address resolution protocol (Two words, no space)
  35. 62. Deceptive network to attract attackers
  36. 63. A popular vulnerability scanner
  37. 65. A temporary power backup solution.
  38. 66. Recovering data from unallocated disk space (Two words, no space)
  39. 67. Data subject to local laws (Two words, no space)
  40. 71. Replacing sensitive payment data with unique identifiers (Two words, no space)
  41. 72. Process of updating systems to fix flaws (Two words, no space)
  42. 73. Failing to detect malicious traffic (Two words, no space)
  43. 74. Identifying and evaluating potential threats (Two words, no space)
  44. 77. This SIEM Component analyzes security logs
  45. 80. The first storage area captured during forensics analysis.
  46. 81. Requirement for protecting primary account numbers