Ziaul Crossword
Across
- 4. attackers who do not report problems, but instead disseminate the information to other black hat attackers
- 7. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
- 10. memory is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- 14. is a series of letters, numbers, and special characters, much like a password, that two communicating devices use to authenticate each other’s identity.
- 16. protocols used by OSs and network devices offer varying levels of secure authentication
- 18. is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
- 20. requires a user to supply two or more types of authentication drawn from these credential categories:
Down
- 1. used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
- 2. Wizard guides you through the process of selecting the type of rule you want to create and the protocols or applications that the rule will apply to
- 3. Authentication Protocol (PAP)
- 5. or server is not communicating with certain applications or services, the protocol might be blocked
- 6. firewall creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- 8. the information that is swapped back and forth from RAM to disk and vice versa is stored in a specially allocated disk area called
- 9. that creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS.
- 11. – backs up the disk sector by sector to create an exact image of the disk’s contents
- 12. distributions have a built-in firewall called netfilter
- 13. testers who are paid to probe networks and OSs and report vulnerabilities to the OS vendor.
- 15. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- 17. Defender Firewall is enabled and configured with default settings
- 19. can be restricted to logging on only from particular workstations