Across
- 2. Code red is a type of computer _______.
- 4. Its Chakravyuh feature is an end-point anti- malware and antivirus software that creates a virtual layer between the user and the internet, blocking hackers from accessing sensitive data.which OS is refered here.
- 5. In ethical hacking and cyber security, there are ______types of scanning.
- 6. what is transformed with the help of a cipher algorithm.
- 10. The technique used to hide information inside a picture.
Down
- 1. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the
- 3. Oldest phone hacking technique used by hackers to make free calls.
- 7. The malware which does not replicate or clone through an infection.
- 8. The debian based OS which has 2 virtual machines and focuses on preserving user's data.
- 9. A type of attack which uses a fraudulent server with a relay address.