CEH Chapter 19 Crossword Puzzle

12345678910111213141516171819202122232425262728293031323334353637
Across
  1. 2. Container security monitoring platform
  2. 3. Software as a service
  3. 6. Identity and access management
  4. 8. Simulated attack to test security
  5. 9. Role based access control
  6. 12. Network address translation service
  7. 13. Cloud security auditing tool
  8. 14. Intrusion prevention security system
  9. 15. Network segment inside cloud network
  10. 16. Cloud access security broker
  11. 17. Infrastructure as a service
  12. 21. Node agent managing containers
  13. 22. Unauthorized cryptocurrency mining attack
  14. 26. Recording system security activity
  15. 27. Installing security updates for systems
  16. 29. Multi factor authentication security method
  17. 31. Container orchestration platform
  18. 34. Incorrect cloud security settings
  19. 35. Data loss prevention technology
  20. 36. Intrusion detection security system
  21. 37. Serverless monitoring and security tool
Down
  1. 1. Platform as a service
  2. 3. Sensitive credentials stored securely
  3. 4. Cloud security organization promoting best practices
  4. 5. Security weakness in system
  5. 7. Verify every user and device
  6. 10. Cloud object storage
  7. 11. Kubernetes cluster key value database
  8. 15. Federated authentication protocol
  9. 16. Portable application runtime environment
  10. 18. Single sign on authentication
  11. 19. Private cloud network environment
  12. 20. Kubernetes cluster management interface
  13. 23. Container platform for applications
  14. 24. Secure cloud web gateway
  15. 25. Data protection using cryptography
  16. 28. Function execution cloud service
  17. 30. Network traffic filtering security system
  18. 32. Internet based computing
  19. 33. Cloud vulnerability scanning platform