trial1-rm

1234567891011121314151617181920
Across
  1. 1. This aerospace manufacturer announced that open source, hybrid cloud and AI technologies from IBM and Red Hat are part of its second mission.
  2. 3. Form of malware that uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users
  3. 5. An IBM Security product that helps security teams detect, prioritize and respond to threats across the enterprise
  4. 9. First computer worm(virus) programmed to move across a network, leaving a small trail (series of signs) wherever it went was ___
  5. 10. A Person who uses technology to gain unauthorized access to data is called a ___ .
  6. 11. To avoid ____________, user input should not be put directly into a database.
  7. 15. IBM’s acquisition of __________ will help clients secure critical assets across hybrid cloud environments—and stay one step ahead of attackers.
  8. 16. A group of protocols used to encrypt data between two communication points.
  9. 17. A protocol used for directory services authentication that was first developed in 1993.
  10. 19. The _____________ ransomware group recently hacked a networking giant by compromising an employee’s personal google account.
  11. 20. “Never trust, always verify” is the first defining principle of which model
Down
  1. 2. I have a dual role in MaaS Architecture –CDN and WAF. Which vendor are we talking about?
  2. 4. For more than three decades, IBM has helped develop and deliver innovative and engaging digital fan experiences at the which tennis championships.
  3. 6. This IBM Research tool allows scientists and businesses to search mountains of unstructured data
  4. 7. Cross-site scripting standing in front of amirror
  5. 8. Vast Strides –I help in identifying Security Vulnerabilities
  6. 12. One-way street to persisting top secrets
  7. 13. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______
  8. 14. IBM and the Alliance to End Plastic Waste created ________, a global information platform to solve a waste data gap
  9. 18. Recent IBM security acquisition of an endpoint security company.