Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
               
               
 
1
2
  
3
    
      
   
  
4
 
      
 
5
 
  
 
  
6
 
7
 
 
 
  
 
  
8
 
 
  
 
 
 
 
  
 
  
 
   
    
 
  
 
   
    
 
  
 
  
9
 
               
               
 
Answer:

Across
1- a series of steps or processes used by an attacker in a logical sequence to launch an attack _____ a target system or network
8- use a challenge response system- in which the server _____ the supplicant during login with a numerical sequence
9the system reviews the log files generation by servers, network devices, and even other IDPSs, looking for patterns and signatures that may indicate that an attack or intrusion is in process or has _____ occurred
Down
2- private word or combination of characters that only the user _____ know
3hack into a hacker’s system to find out as much as possible about the _____
4- resides on a particular computer or server, known as the host, and monitors _____ only on that system
5Partially distributed IDPS _____ strategy
6tools used by both attackers and defenders to identify or fingerprint the computers that are active on a network, as well as the ports and services _____ on those computers, the functions and roles the machines are fulfilling, and other useful informati
7sometimes _____ a network protocol analyzer is a network tool that collects copies of packets from the network and analyzes them

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: chels2407
Popular Computers sets