Chapter 8 Security Plus

12345678910111213141516171819
Across
  1. 5. examines the current state of an endpoint before it can connect
  2. 7. Removing or dismantling a technology
  3. 10. A device that distributes resources and services to devices connected to the network
  4. 11. Designed to limit the spread of malware
  5. 13. Automatically blocking an attack when it occurs
  6. 15. Fake data that has been added to live production systems
  7. 17. A physically separated network
  8. 18. Known attack patterns
  9. 19. A network set up with intentional vulnerabilities
Down
  1. 1. A device that distributes work across a network
  2. 2. The means for communication in a zero-trust architecture
  3. 3. Verification of a user in a zero-trust architecture
  4. 4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. 6. server within the DMZ that is used to connect two dissimilar security zones
  6. 8. A user in a zero-trust architecture
  7. 9. Criteria for which a website is inaccessible to users
  8. 12. A network device that can forward packets across different computer networks
  9. 14. Keeping multiple instances of an attack surface separate
  10. 16. filtering entire domains