NSA

12345678910111213141516
Across
  1. 2. / Windows 2008 has two types of account Local and ___________
  2. 3. / a device designed to control the flow of traffic into and out-of a network
  3. 5. / Ping O’ Death is a ___________ attack.
  4. 6. / Each computer in a DNS domain is uniquely identified by its?
  5. 7. / Virus scanners must determine the ___________ of the file to determine that it is a virus
  6. 9. / ___________ Filtering A Technique employed to ensure that incoming packets are from the network they say they are from
  7. 11. / A group policy that is obtained from a higher level.
  8. 14. / An attack from many agents.
  9. 15. / Failing to install and update security patches could lead to a ____ on your system
  10. 16. / They change their encryption module on replication
Down
  1. 1. / A built in account
  2. 4. / Units that mirror your organization's functional or business structure
  3. 8. / A virus that spreads via Word, Excel, PowerPoint & PDF files
  4. 10. / A built in account
  5. 12. / A Syn Flood attack exploits the TCP ________________
  6. 13. / Software that uses security holes to replicate itself