CISO Crossword Quiz - 2025

12345678910
Across
  1. 2. What is the process of collecting and analyzing electronic data to investigate security incidents?
  2. 5. What cyberattack tricks a DNS server into redirecting traffic to a malicious site?
  3. 7. What technique isolates programs to prevent malware from spreading across a system?
  4. 8. What do we call configuring a web browser to reduce its vulnerability to attack?
  5. 9. What is the proactive process of searching through networks to detect and isolate advanced threats?
  6. 10. What cybersecurity model assumes no implicit trust and verifies every access attempt?
Down
  1. 1. What term describes an organization’s ability to continue operations during and after a cyberattack?
  2. 3. What browser mode hides your browsing history from others who use your device?
  3. 4. What is the term for the trail of data a person leaves behind while using the internet?
  4. 6. What term describes hardware or software used within an organization without explicit IT approval?