Across
- 2. Which tool can reveal hidden relationships and identify attack paths within an AD environment ?
- 4. Which computer network security protocol used by Windows is designed to authenticate service requests between two or more trusted hosts across an untrusted network, like the internet ?
- 6. Find a synonym of preempt
Down
- 1. What is the naming convention for ecrime category ?
- 2. What is 84 minutes the average time for ?
- 3. What defense technology aims to lure attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets ?
- 5. Which type of accounts are mainly targeted by adversaries ?