Chapter 2

1234567891011121314151617
Across
  1. 4. threat actor that seeks to harm the government
  2. 8. reduce the risk of a threat
  3. 11. individual who gains unauthorized access
  4. 14. when different employees take over job tasks
  5. 15. this privilege principal limits access to work tasks
  6. 17. after an attack perform a memory
Down
  1. 1. media preparation technique
  2. 2. this document states who has had access to the evidence
  3. 3. this security measure is AKA defense-in-depth
  4. 5. identifies traffic on your network
  5. 6. important aspect of evidence gathering
  6. 7. separation of ___
  7. 9. testing tool to validate bandwidth
  8. 10. this testing type simulates a large number of clients
  9. 12. privileges resulting from of privilege escalation
  10. 13. are the greatest threat to network security
  11. 16. changes the position of characters