Across
- 4. Collection of network resources.
- 5. Password hacking tool used to capture keystrokes of a keyboard.
- 7. This Linux command is used to filter the output of a command.
- 9. reputable organizations that are responsible for issuing public certificates to companies or organizations.
- 10. Public Keys are generated for each new session or message sent.
- 14. Network resource in the Active directory.
- 15. An IPsec protocol used for negotiation.
- 17. This certificate type allows the organization to have multiple host names covered in one certificate.
- 20. A well-known hashing algorithm.
- 21. Password relates to things that people know, such as a mother's maiden name or a pet's name.
- 22. Adding random bits of data to a password before it is stored as a hash.
- 23. This log type provides VOIP event information.
- 24. Highest level of certificate validation offered by a CA.
- 27. An online certification checking protocol.
- 31. Used to encrypt individual files and folders on a Windows Computer.
- 33. Obfuscating a secret inside a file such as an image.
- 36. The most common protocol analyzer.
- 41. This file consist of account passwords on Linux systems.
- 42. IDS detection types that compare the behaviour of traffic to baseline profiles.
- 45. Hashing attack that combines a collision attack and a brute-force attack.
- 48. Linux command used to change permissions.
- 50. Forensics techniques can you used to recover files based only on their structure.
- 51. A security hardware or software that identifies and prevents intrusions.
- 53. Packet filtering mechanism used by gateway routers and firewalls.
- 54. A site redundancy with little or no configuration.
- 55. command used to crack the password with the rainbow attack.
- 60. Obtaining computer names, user accounts and open ports.
- 61. CLI utility used to query a name server.
- 62. Used to encrypt an entire volume.
- 63. Transferring data from your system to another.
Down
- 1. 802.1x is used on switching networks for this purpose.
- 2. These types of malware reside solely in the system's memory making it more difficult to detect and remove.
- 3. This VPN component uses to control access to provide network.
- 6. A backup solution which will not clear the archive bit when the backup is created.
- 8. protocol enables Virtual Private Network (VPN) traffic to pass through Network Address Translation (NAT) gateways or routers.
- 11. SYN flood attack is a common example of this DDoS method.
- 12. A vulnerability scanner that provides remediation.
- 13. Type of cyber attack in which an attacker gathers information about a target organization.
- 16. Used by Application control solutions to identify applications.
- 18. This server provides authentication services.
- 19. The science of gathering and analyzing digital data.
- 25. A secured zone for publicly accessed servers.
- 26. A list of steps needs to be taken by an administrator generated from SOAR.
- 28. This system is used to organize and prioritize vulnerabilities.
- 29. RSA and ECC are examples of these types of cryptographic algorithms.
- 30. This ethical hacking team is responsible for managing other teams.
- 32. A logging server.
- 34. IPSec subprotocol provides data encryption.
- 35. Linux and Unix command is used to query the name server.
- 37. A forensic tool used for digital investigation and analysis.
- 38. Cryptography algorithm used for comparison.
- 39. The most volatile memory on a computer
- 40. Provides fault tolerance for your storage devices.
- 41. Logs related to OS like updates, errors, andĀ failures.
- 43. Used by Application Control Solution to slow down, delay or drop traffics.
- 44. This SIEM component is responsible for gathering logs and events from network components.
- 45. Decentralized and distributed ledger that records and verifies transactions between two parties.
- 46. Set of tools, technologies, and processes that are designed to prevent the loss or unauthorized disclosure of sensitive information.
- 47. A mobile solution to manage an organization's mobile devices.
- 49. This email metadata can be used to check the authenticity of an email.
- 52. Provides a framework for negotiating and selecting different authentication mechanisms supporting Kerberos and LDAP.
- 56. connecting multiple servers to provide redundancy and load sharing.
- 57. In this testing environment, the penetration tester has no information regarding the target or network.
- 58. Environment in which public encryption keys can be created and managed throughout the key lifecycle.
- 59. this cryptography hardware can generate asymmetric cryptographic public and private keys.
