Across
- 3. With any computer, you should shut down any _______ you do not need
- 4. Also called a DMZ
- 7. The third phase of assessing a system's security using the Six P's
- 9. The minimum frequency for system probing and auditing is once per _____
- 10. The most important factor when looking for a security professional
- 13. You should block all ______ ports
- 15. Room where servers are kept. It should have a strong door with a strong luck, such as a deadbolt
- 17. Command typed at the command line to edit your registry
- 18. The most respected security certification
- 19. The preferred method for storing backups
Down
- 1. It is absolutely essential that any organization have clearly written _______ on computer security
- 2. The process of securing a computer system against hackers, malware, and other intruders
- 4. Old media should be thoroughly ________ when no longer needed
- 5. Any legitimate security professional will not mind giving you ______
- 6. All communication takes place via some ______
- 8. ________ access to routers, hubs, and switches should be tightly controlled (Last of the Six P's)
- 11. The first rule of computer security is to check for ______
- 12. It is key to periodically ______ your network for security flaws (One of the Six P's)
- 14. Only download from well-known, ______ sites
- 16. The most widely used vulnerability scanner available today
