CISO Crossword Quiz - 2225

12345678910
Across
  1. 4. Which secured number is not required for receiving money through UPI?
  2. 7. What practice involves authorized and legal attempts to penetrate computer systems, networks, or applications to uncover vulnerabilities and security weaknesses, with the goal of improving overall security?
  3. 9. What is a simulated discussion-based activity where participants, often key personnel having emergency management roles during a Cyber Crisis, simulate a real-world cyber incidents/crisis to test an organization's response?
  4. 10. What disguised link leads to a malicious webpage?
Down
  1. 1. What method uses a QR code to lead users to fake webpage/payment sites?
  2. 2. What security mechanism focuses on protecting devices, or "endpoints," that connect to a network, like laptops, smartphones, and servers, from cyber threats?
  3. 3. What refers to all the potential entry points an attacker could use to gain unauthorized access to an organization's systems, data, or infrastructure?
  4. 5. What should be strong and unique to protect your online accounts?
  5. 6. What term describes an entity or attacker attempting to breach cybersecurity defense of an organization?
  6. 8. What attack tricks people into clicking something different than they think?