Across
- 2. Windows tool used to gather long-term statistics for individual components to see how they are performing
- 5. Type of computing offering on-demand services extending capabilities of computer or network
- 8. The brain of the computer
- 10. Open-source operating system supported by a range of hardware and software vendors
- 14. Method by which attacker or malware gains access to network or system
- 15. Step 1 in the Incident Response Process
- 16. CPU type common to Intel
- 17. Uses two different keys for encryption/decryption
- 18. Type of site that has everything needed and can be activated and running fully within minutes in the event of a disaster
- 19. The 'C' of the Security Triad
- 22. Framework to help a company develop organizational controls and risk management for an information security program
- 23. Utility used to check integrity of Windows operating system files
- 24. Minimum terms for services provided, commonly used between customers and providers
- 26. Printer type using a laser beam to project image onto an electrically charged drum
- 27. TCP port 389
- 28. Tool used to check for voltages or continuity
- 29. RAID 1
- 30. Windows registry editor
Down
- 1. Type of attack used to steal credit card information during a normal transaction
- 3. Type of malware that attempts to extort money from victims
- 4. Entering a secure area without authorization by following close behind someone who has access
- 6. Common symptom of fan failure
- 7. Default Windows power plan
- 9. MFA factor known as something you know
- 11. Tool to check the state of ports on a local host
- 12. Password manager for macOS
- 13. How often you should check to ensure no vents/openings on the computer are obstructed
- 19. macOS tool similar to Event Viewer in Windows
- 20. Printer type that forms images from liquid ink cartridges mounted on a carriage assembly
- 21. Primary file system for Windows
- 25. Layer 4 of the OSI Model
- 27. Apple proprietary connector
