U03 - CSE-CH6

1234567891011121314
Across
  1. 5. (7,8) with this defence method if cyber criminals penetrate one layer, they still have to contend with several more layers with each layer being more complicated than the previous one.
  2. 8. (9,5,2,11,5) combines multiple physical hard drives into a single logical unit to provide data redundancy and improve performance.
  3. 12. (9,11) An organization should not reveal any information that cyber criminals can use to figure out what version of the operating system a server is running or the type of equipment it uses.
  4. 13. (7,7) is typically the router that provides devices access to the rest of the network or to the Internet.
  5. 14. refers to changing the controls and procedures at different layers.
Down
  1. 1. (8,4) a network protocol used with network switches that prevents loops on a network when switches interconnect via multiple paths.
  2. 2. involves reducing the severity of the loss or the likelihood of the loss from occurring.
  3. 3. (5,15) as part of an IT asset management system, an organization specifies the acceptable IT assets that meet its objectives
  4. 4. (5,10) includes a complete inventory of hardware and software.
  5. 6. (4,8) is the process of analyzing the dangers posed by natural and human-caused events to the assets of an organization.
  6. 7. (4,5) means that systems and services are available 99.999%
  7. 9. (4,12) incorporates Fault Tolerance, System Resiliency, and Elimination or reduction of single-points of failure
  8. 10. (6,5,2,7) can be a specific piece of hardware, a process, a specific piece of data, or even an essential utility.
  9. 11. (8,6) with approach is used to reduces the possibility of a threat to data and information. An organization should restrict access so that users only have the level of access required to do their job.