1
              
   
 
2
3
  
   
          
   
   
      
4
   
   
 
5
 
 
6
 
   
 
 
      
   
   
 
7
   
 
 
      
       
 
     
8
     
 
9
           
                  
 
Answer:

Across
2a prospective user who, in the context of access control, seeks to use a protected system, logically access a protected service, or physically enter a protected space
6Application _____ verification-
7designed to trip the _____ IDPS, essentially causing the organization to conduct its own
8one that listens in on the network and determines vulnerable versions of both server and _____ software
9- specially configured connection on a network _____ that is capable of viewing all of the traffic that moves through the entire device
Down
1Partially distributed IDPS control _____
3Synchronous _____
4tools used by both attackers and defenders to identify or fingerprint the computers that are active on a network, as well as the ports and services _____ on those computers, the functions and roles the machines are fulfilling, and other useful informati
5- private word or combination of characters that only the user _____ know