Exam Prep

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
Across
  1. 4. Collection of network resources.
  2. 5. Password hacking tool used to capture keystrokes of a keyboard.
  3. 7. This Linux command is used to filter the output of a command.
  4. 9. reputable organizations that are responsible for issuing public certificates to companies or organizations.
  5. 10. Public Keys are generated for each new session or message sent.
  6. 14. Network resource in the Active directory.
  7. 15. An IPsec protocol used for negotiation.
  8. 17. This certificate type allows the organization to have multiple host names covered in one certificate.
  9. 20. A well-known hashing algorithm.
  10. 21. Password relates to things that people know, such as a mother's maiden name or a pet's name.
  11. 22. Adding random bits of data to a password before it is stored as a hash.
  12. 23. This log type provides VOIP event information.
  13. 24. Highest level of certificate validation offered by a CA.
  14. 27. An online certification checking protocol.
  15. 31. Used to encrypt individual files and folders on a Windows Computer.
  16. 33. Obfuscating a secret inside a file such as an image.
  17. 36. The most common protocol analyzer.
  18. 41. This file consist of account passwords on Linux systems.
  19. 42. IDS detection types that compare the behaviour of traffic to baseline profiles.
  20. 45. Hashing attack that combines a collision attack and a brute-force attack.
  21. 48. Linux command used to change permissions.
  22. 50. Forensics techniques can you used to recover files based only on their structure.
  23. 51. A security hardware or software that identifies and prevents intrusions.
  24. 53. Packet filtering mechanism used by gateway routers and firewalls.
  25. 54. A site redundancy with little or no configuration.
  26. 55. command used to crack the password with the rainbow attack.
  27. 60. Obtaining computer names, user accounts and open ports.
  28. 61. CLI utility used to query a name server.
  29. 62. Used to encrypt an entire volume.
  30. 63. Transferring data from your system to another.
Down
  1. 1. 802.1x is used on switching networks for this purpose.
  2. 2. These types of malware reside solely in the system's memory making it more difficult to detect and remove.
  3. 3. This VPN component uses to control access to provide network.
  4. 6. A backup solution which will not clear the archive bit when the backup is created.
  5. 8. protocol enables Virtual Private Network (VPN) traffic to pass through Network Address Translation (NAT) gateways or routers.
  6. 11. SYN flood attack is a common example of this DDoS method.
  7. 12. A vulnerability scanner that provides remediation.
  8. 13. Type of cyber attack in which an attacker gathers information about a target organization.
  9. 16. Used by Application control solutions to identify applications.
  10. 18. This server provides authentication services.
  11. 19. The science of gathering and analyzing digital data.
  12. 25. A secured zone for publicly accessed servers.
  13. 26. A list of steps needs to be taken by an administrator generated from SOAR.
  14. 28. This system is used to organize and prioritize vulnerabilities.
  15. 29. RSA and ECC are examples of these types of cryptographic algorithms.
  16. 30. This ethical hacking team is responsible for managing other teams.
  17. 32. A logging server.
  18. 34. IPSec subprotocol provides data encryption.
  19. 35. Linux and Unix command is used to query the name server.
  20. 37. A forensic tool used for digital investigation and analysis.
  21. 38. Cryptography algorithm used for comparison.
  22. 39. The most volatile memory on a computer
  23. 40. Provides fault tolerance for your storage devices.
  24. 41. Logs related to OS like updates, errors, andĀ failures.
  25. 43. Used by Application Control Solution to slow down, delay or drop traffics.
  26. 44. This SIEM component is responsible for gathering logs and events from network components.
  27. 45. Decentralized and distributed ledger that records and verifies transactions between two parties.
  28. 46. Set of tools, technologies, and processes that are designed to prevent the loss or unauthorized disclosure of sensitive information.
  29. 47. A mobile solution to manage an organization's mobile devices.
  30. 49. This email metadata can be used to check the authenticity of an email.
  31. 52. Provides a framework for negotiating and selecting different authentication mechanisms supporting Kerberos and LDAP.
  32. 56. connecting multiple servers to provide redundancy and load sharing.
  33. 57. In this testing environment, the penetration tester has no information regarding the target or network.
  34. 58. Environment in which public encryption keys can be created and managed throughout the key lifecycle.
  35. 59. this cryptography hardware can generate asymmetric cryptographic public and private keys.