The Best Crossword Puzzle Maker Online
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Security

Across
You work in an environment where your laptop is clearly visible to people nearby. You want to prevent other individuals from viewing your screen. What could you do to help prevent this from happening?
What feature of a wireless access point would you use to either allow or deny host access, based on the layer 2 address?
What can you do to prevent your wireless SSID from showing up on a list of available networks?
What is a commonly used method to prevent the theft of laptops?
Which type of security method is used to unlock a mobile device with your finger?
Changing a MAC address to match another host address in order to appear to be a trusted host on a network is referred to as ____
What is a security device that users carry with them, usually in the form of a key fob.
When a vulnerability exists in software that is, as yet, unknown to the vendor, but known to a hacker, this is referred to as a ____.
Down
This security threat occurs when someone on your network can monitor a conversation in both directions and can secretively modify the contents of the communications.
A feature of NTFS that allows users to encrypt individual files, rather than an entire volume, is referred to as ____.
This is a form of malicious software that appears to become part of the operating system by modifying the core system files to hide itself.
This type of list permits or denies a user’s access inside a network, such as being able to access a server or specific files.
What type of certificate are you given when a third party has wiped off all the data on your hard drives?
What is it called when you magnetically remove all of the data on a hard drive?
You are responsible for securing a large server room. You want to prevent unauthorized personnel from gaining entrance by simply following an authorized user into the room (a security breach referred to as tailgating). Which common prevention method would you incorporate to best secure the area?
This Windows feature allows users to encrypt an entire volume, making it secure even if the drive is stolen.