Test 31-03-2023
Across
- 2. Protocol Used to configure network devices to communicate on an IP network
- 3. Provides encrypted connection over the internet from a device to a network
- 4. Designed to continuously monitor a large number of areas for water leaks throughout a building
- 6. A solution that helps organisations detect, analyze and respond to security threats before they harm business operations
- 8. Evidence validated/reviewed for ensuring effectiveness of implemented control.
- 10. Email Authentication protocol that provides domain level protection of the email channel
- 13. Issues general licenses in order to authorize activities that would otherwise be prohibited with regard to the Cyber-related sanctions
Down
- 1. A document prepared for capturing controls implemented for meetina contractual requirement
- 2. Translates human readable domain names to machine readable IP addresses
- 5. It runs your code on high availability compute infrastructure and performs all the administration of your compute resources
- 7. Group of experts responsible for the protection against detection of and response to an organisation's security incidents
- 9. Continuously monitors end user devices to detect and respond to cyber threats
- 11. Maximum tolerable time that a computer/application can be down after a failure/disaster occurs
- 12. Document for capturing all the contractual security requirements
- 14. A system which warns people when smoke, fire, carbon monoxide or other fire related emergencies are detected