Across
- 2. ____ attack Sending deceptive emails or websites to trick users
- 5. A device allowing some packets to pass and blocking others
- 7. A hidden entry point intentionally left by developers for debugging
- 8. A digital signature needs a_____ Key
- 10. The main component of Kerberos responsible for granting access to services is:
Down
- 1. In IPsec ______ protocol provides Authentication and integrity but no encryption
- 3. ___________is primarily used to Hide data within other media
- 4. Eavesdropping on a network is an example of which type of attack?
- 6. Which part of the CIA triad is concerned with ensuring data is accurate and has not been altered?
- 9. S/MIME provides security at the ______ layer.
