cis212-in-seat-review-w4

12345678910111213141516171819202122232425
Across
  1. 2. A logical computer network of zombies.
  2. 5. Isolated environment use to test potential malware.
  3. 8. Computer most closely resembles a desktop computer
  4. 10. Technique to diminish risk level
  5. 12. The necessary steps to protect a person or property from harm
  6. 13. Only allows what in on this list.
  7. 15. The first step in the Cyber Kill Chain
  8. 16. Addresses general vulnerability
  9. 19. Where web-based computers store its user files.
  10. 20. Eliminating as many security risks as possible
  11. 22. Addresses specific customer situation
  12. 24. System use to collect attackers techniques
  13. 25. Rules of conduct and communication
Down
  1. 1. Microsoft transport protocol
  2. 3. Another name for Add-on
  3. 4. Purchasing security products from different vendors
  4. 6. Unauthorized access through a Bluetooth connection
  5. 7. Captures and store keystrokes
  6. 9. Validating individuals credentials
  7. 11. Enforces the location in which an app can function
  8. 14. Managing and presenting by function without physical layout or location.
  9. 17. A set of rules for how Microsoft Windows applications share information
  10. 18. A large system with many capabilities.
  11. 21. Designated to analysis network packets
  12. 23. Impersonating another computer of device