Ziaul Crossword

1234567891011121314151617181920
Across
  1. 4. attackers who do not report problems, but instead disseminate the information to other black hat attackers
  2. 7. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
  3. 10. memory is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  4. 14. is a series of letters, numbers, and special characters, much like a password, that two communicating devices use to authenticate each other’s identity.
  5. 16. protocols used by OSs and network devices offer varying levels of secure authentication
  6. 18. is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
  7. 20. requires a user to supply two or more types of authentication drawn from these credential categories:
Down
  1. 1. used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
  2. 2. Wizard guides you through the process of selecting the type of rule you want to create and the protocols or applications that the rule will apply to
  3. 3. Authentication Protocol (PAP)
  4. 5. or server is not communicating with certain applications or services, the protocol might be blocked
  5. 6. firewall creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  6. 8. the information that is swapped back and forth from RAM to disk and vice versa is stored in a specially allocated disk area called
  7. 9. that creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS.
  8. 11. – backs up the disk sector by sector to create an exact image of the disk’s contents
  9. 12. distributions have a built-in firewall called netfilter
  10. 13. testers who are paid to probe networks and OSs and report vulnerabilities to the OS vendor.
  11. 15. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
  12. 17. Defender Firewall is enabled and configured with default settings
  13. 19. can be restricted to logging on only from particular workstations