Across
- 3. Encompasses the recovery, investigation, examination, and analysis of material found in digital devices during incidents.
- 6. Security team that manages an organization's network defense.
- 7. Type of RFID tag can send a signal over a long distance.
- 9. Provides the network virtualization solution called XenServer.
- 10. type of interference is caused by motors, heavy machinery, and fluorescent lights.
- 11. The most volatile memory in the gathering of potential evidence.
- 13. An security system that identifies any attacks. In addition, takes immediate action to stop or prevent the attack.
- 15. Backup strategy backs up all files from a computer's file system.
- 16. Cloud computing solutions delivers software applications to a client.
- 17. Used as a secure tunnel to connect two networks.
- 20. This layer of SDN communicates with the Control layer through what is called the northbound interface.
- 21. Password attack employs a list of pre-defined passwords that it tries against a login prompt.
- 22. Message authentication code that allows a user to verify that a file or message is legitimate.
- 24. Type of wireless access point is generally used in a residential setting.
- 26. sends unsolicited business cards and messages to a Bluetooth device.
- 28. Process of adding random characters at the beginning or end of a password to generate a completely different hash.
- 30. An exploit in which malware allows the virtual OS to interact directly with the hypervisor.
- 32. Protocol for logging.
- 36. An attack that injects malicious scripts into web pages to redirect users to fake websites to gather personal information.
- 38. A PKI is an implementation for managing which type of encryption.
- 39. Dumpster diving is this type of reconnaissance.
- 40. One of the most popular packet capturing tools.
- 43. Rights management category is applied to music, videos, and software that is sold to consumers.
Down
- 1. Connects multiple servers together so that if one server fails, the others immediately take over its tasks.
- 2. Entering random data to the inputs of an application.
- 4. Violation of a security policy.
- 5. SIEM component that is responsible for gathering all event logs from configured devices.
- 8. A Cloud technology that allows cloud services to be shared by several.
- 12. DLP method works by replacing sensitive data with realistic fictional data.
- 14. A Cloud technology that provides cloud services to just about anyone.
- 16. These types of logs are generated when a computer randomly restarts.
- 18. (SOAR) system automation components that shows processes and procedures that are to be used by a human.
- 19. Tool that can be used to view and modify DNS server information in Linux.
- 23. A vulnerability scan method in which administrator logos into a system for scanning.
- 25. Used to verify that a downloaded file has not been altered.
- 27. Protocol used by IPsec to create a security association between communicating partners.
- 28. Cryptography mechanism that hides secret communications within various forms of data.
- 29. A Wireless device used to manage multiple access points in your organization.
- 31. MOST secure EAP implementation.
- 32. used on a wireless network to identify the network name.
- 33. passive reconnaissance tool is used to gather information from a variety of public sources.
- 34. Computer software, firmware, or hardware that creates and runs virtual machines.
- 35. Acronym for a solution that pushes security policies directly to mobile devices over a network.
- 37. An SDN layer also known as the Infrastructure layer.
- 41. Password attack with a large table of hashes.
- 42. Harddrive configuration used for data redundancy.
