Across
- 3. A proxy-based tool used to evaluate the security of web-based applications and do hands-on testing.
- 4. Strongest wireless security.
- 5. ___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.
Down
- 1. ________ is an act that violates cyber-security.
- 2. existence of weakness in a system or network is called _______.
- 4. Least strong security encryption standard.
