Across
- 1. What type of malware self-replicates?
- 5. What requires a Windows-created password to gain access to it?
- 6. What document can aid you if a chemical spill occurs?
- 7. You find illegal materials on a customer's computer. Your boss commands you to preserve computer evidence until he gets to the scene. Your boss is asking to begin a chain of _______.
- 10. What is the science of recognizing humans based on physical characteristics?
Down
- 2. What type of malware is designed to gain administrative-level control of a system?
- 3. What is type of regulated data is specifically protected under the HIPAA Privacy Rule?
- 4. Non-_________ is not one of the steps of the incident response process.
- 8. You have been tasked with preventing the unwanted removal of a webcam. You should implement a ____ lock.
- 9. _____-force describes an attempt to guess a password by using a combination of letters and numbers.
