Hard Level

12345
Across
  1. 3. A proxy-based tool used to evaluate the security of web-based applications and do hands-on testing.
  2. 4. Strongest wireless security.
  3. 5. ___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.
Down
  1. 1. ________ is an act that violates cyber-security.
  2. 2. existence of weakness in a system or network is called _______.
  3. 4. Least strong security encryption standard.