Test 31-03-2023

1234567891011121314
Across
  1. 2. Protocol Used to configure network devices to communicate on an IP network
  2. 3. Provides encrypted connection over the internet from a device to a network
  3. 4. Designed to continuously monitor a large number of areas for water leaks throughout a building
  4. 6. A solution that helps organisations detect, analyze and respond to security threats before they harm business operations
  5. 8. Evidence validated/reviewed for ensuring effectiveness of implemented control.
  6. 10. Email Authentication protocol that provides domain level protection of the email channel
  7. 13. Issues general licenses in order to authorize activities that would otherwise be prohibited with regard to the Cyber-related sanctions
Down
  1. 1. A document prepared for capturing controls implemented for meetina contractual requirement
  2. 2. Translates human readable domain names to machine readable IP addresses
  3. 5. It runs your code on high availability compute infrastructure and performs all the administration of your compute resources
  4. 7. Group of experts responsible for the protection against detection of and response to an organisation's security incidents
  5. 9. Continuously monitors end user devices to detect and respond to cyber threats
  6. 11. Maximum tolerable time that a computer/application can be down after a failure/disaster occurs
  7. 12. Document for capturing all the contractual security requirements
  8. 14. A system which warns people when smoke, fire, carbon monoxide or other fire related emergencies are detected