Chapter 5 CEH Crossword Puzzle

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
Across
  1. 2. Tool driven vulnerability detection process
  2. 7. Verification of user supplied data
  3. 10. Cloud based vulnerability management platform
  4. 13. Security testing from outside the network
  5. 14. Observation without interacting with targets
  6. 16. List of organizational systems and devices
  7. 18. Process of determining threat impact level
  8. 19. Network communication points exposed to access
  9. 20. Assessment of database security risks
  10. 22. System used to measure vulnerability severity
  11. 25. Compromise occurring through external suppliers
  12. 26. Software weakness exploitable by attackers
  13. 27. Use of insecure cryptographic protection
  14. 28. Standard identifier assigned to vulnerabilities
  15. 30. Testing software for security weaknesses
  16. 32. Timing issue caused by simultaneous operations
  17. 33. Web server vulnerability scanning tool
  18. 34. Device missing security updates
  19. 36. Process of updating systems to fix vulnerabilities
  20. 37. Factory settings that reduce system security
  21. 38. Process of identifying and evaluating security weaknesses
  22. 40. Automated search for known security flaws
  23. 42. Scan performed using authorized access
  24. 45. Examination focused on individual systems
  25. 46. Approved configuration standard for systems
  26. 47. Verification method confirming trusted software
  27. 48. Arithmetic value exceeding storage limits
  28. 49. Continuous observation for new threats
Down
  1. 1. Memory overwrite caused by excessive input
  2. 3. Consumption of system resources causing failure
  3. 4. Detection of weaknesses in wireless networks
  4. 5. Security testing within organizational network
  5. 6. Human performed security testing
  6. 8. Repository containing vulnerability information
  7. 9. Execution of malicious library inside process
  8. 11. Failure to release allocated system memory
  9. 12. Classification system for software weaknesses
  10. 15. Document describing discovered security risks
  11. 17. Direct probing of systems to detect flaws
  12. 21. Incorrect system or network settings creating risk
  13. 23. Evaluation and prioritization of discovered weaknesses
  14. 24. Open source vulnerability management scanner
  15. 29. Confirmation that security fixes are effective
  16. 31. Security exposure introduced by vendors
  17. 35. Management of system error responses
  18. 39. Actions taken to correct vulnerabilities
  19. 41. Access attempt to invalid memory location
  20. 43. Vulnerability scanning assessment tool
  21. 44. Discovery of services ports and devices