My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Week 5 Security

Across
Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter?
What is the name given to the programming code patterns of a virus?
What kind of attack prevents the server from answering requests from other computers for service?
When someone calls asking for password and username, and claims to be part of IT security when they are not. What type of security risk is this?
What security threat uses email that appears to be from a legitimate sender but asks for confidential information?
Down
When a worm creates copies of itself without human intervention, we say that the worm is (blank)ing
A user has reported that a computer web browser will not display the correct home page even if the default page is reset. What is the likely cause of this problem?
This Windows 7 tool can encrypt an entire hard drive.
What can you disable to stop viruses from transferring from memory sticks and flash drives to a machine?
What is the most effective way to secure wireless traffic? (blank)2
What uses asymmetric encryption and is either public or private?