U11 - Mod 4 Key Terms

12345678910
Across
  1. 1. (4,9) Attackers execute commands on a web server’s OS through a vulnerable web application.
  2. 3. (4,7) typical a web attack where the victim unknowingly visits a web page that has been compromised by malware.
  3. 6. (11-5,5) Threat actors embed malicious content in business files such as an email from the IT department.
  4. 7. (3,4,8) answers queries from clients outside of its administrative domain and is vulnerable to multiple malicious activities
  5. 9. spoofing (5,9) Threat actors create email messages with a forged sender address that is meant to fool the recipient into providing money or sensitive information.
  6. 10. (9,6) This is an HTML element that allows the browser to load another web page from another source.
Down
  1. 2. (4,4,5,6) Threat actors take advantage of enterprise servers that are misconfigured as open mail relays to send large volumes of spam or malware to unsuspecting users.
  2. 4. Scripting (5-4,8) occurs when web pages that are executed on the client-side, within their own web browser, are injected with malicious scripts.
  3. 5. (4,7) Occur when a rogue server is connected to the network and provides false IP configuration parameters to legitimate clients.
  4. 8. (4,5) Threat actors send unsolicited email containing advertisements or malicious files.