Securing Computer
Across
- 3. What is type of regulated data is specifically protected under the HIPAA Privacy Rule?
- 6. What document can aid you if a chemical spill occurs?
- 8. _____-force describes an attempt to guess a password by using a combination of letters and numbers.
- 9. A user clicked a link in an e-mail that appeared to be from his bank. The link led him to a page that requested he change his password to access his bank account. It turns out that the webpage was fraudulent. What is this an example of?
- 12. Non-_________ is not one of the steps of the incident response process.
- 13. What type of malware self-replicates?
- 14. You find illegal materials on a customer's computer. Your boss commands you to preserve computer evidence until he gets to the scene. Your boss is asking to begin a chain of _______.
Down
- 1. What type of malware is designed to gain administrative-level control of a system?
- 2. Disable ______ can prevent applications from automatically executing, and possibly infecting a computer with malware when removable media is inserted.
- 4. What requires a Windows-created password to gain access to it?
- 5. You have been tasked with preventing the unwanted removal of a webcam. You should implement a ____ lock.
- 7. What is the science of recognizing humans based on physical characteristics?
- 10. Several hundred infected computers simultaneously attacked your organization's server, rendering it useless to legitimate users. What kind of attack is this an example of?
- 11. What is the best mode to use when scanning for viruses?