Security Lab

12345678910
Across
  1. 2. ____ attack Sending deceptive emails or websites to trick users
  2. 5. A device allowing some packets to pass and blocking others
  3. 7. A hidden entry point intentionally left by developers for debugging
  4. 8. A digital signature needs a_____ Key
  5. 10. The main component of Kerberos responsible for granting access to services is:
Down
  1. 1. In IPsec ______ protocol provides Authentication and integrity but no encryption
  2. 3. ___________is primarily used to Hide data within other media
  3. 4. Eavesdropping on a network is an example of which type of attack?
  4. 6. Which part of the CIA triad is concerned with ensuring data is accurate and has not been altered?
  5. 9. S/MIME provides security at the ______ layer.