Across |
2 | a prospective user who, in the context of access control, seeks to use a protected system, logically access a protected service, or physically enter a protected space
|
6 | Application _____ verification- |
7 | designed to trip the _____ IDPS, essentially causing the organization to conduct its own
|
8 | one that listens in on the network and determines vulnerable versions of both server and _____ software
|
9 | - specially configured connection on a network _____ that is capable of viewing all of the traffic that moves through the entire device
|
Down |
1 | Partially distributed IDPS control _____ |
3 | Synchronous _____ |
4 | tools used by both attackers and defenders to identify or fingerprint the computers that are active on a network, as well as the ports and services _____ on those computers, the functions and roles the machines are fulfilling, and other useful informati |
5 | - private word or combination of characters that only the user _____ know
|