CISMP

123456789
Across
  1. 1. A formal or informal review of actions (5)
  2. 5. One of the components that make up the CIA (15)
  3. 6. If the accuracy of information is a major concern, which one of the CIA components would be used (9)
  4. 8. Which security document is not mandatory? (1,8)
  5. 9. What is said to take advantage of, or exploit vulnerabilities (1,7)
Down
  1. 1. When a user logs onto a computer system and is asked for their mother's maiden name, what aspect is the system ensuring? (12)
  2. 2. Another term to describe a Security Steering Group (7,5)
  3. 3. Privacy legislation is in place to protect the rights of
  4. 4. One of the two types of threats (10)
  5. 7. A type of risk mitigation (8)