New Activity
Play Crossword Puzzle
1 __________ requires those who have access to data and applications to keep details private within an organization
2 Microsoft _______ protects cloud-based applications from various cyber threats and vulnerabilities and is effective against common malware and viruses
3 In the 3 point strategy of Microsoft Defender, you must ______ your network to detect and resolve threats to resources, workloads and services.
4 _________ requires that data (either at rest or in transit) cannot be intercepted or changed in any way that isn’t authorized.
5 Make sure that all services, resources and applications have redundancy in multiple regions to keep network “up and going.”
6 In the 3 point strategy of Microsoft Defender, you must ______ your network by hardening resources and services.
7 ________ are physical devices that connect to and exchange information with a computer network. Examples include mobile devices, desktop computers, virtual machines, embedded devices, and servers.
8 Attackers create _______ networks to flood a website/server with traffic until it crashes.
9 In the 3 point strategy of Microsoft Defender, you must continuously _________ - to know your security posture, identify and track vulnerabilities.
10 A distributed denial of service or ______ attack is a malicious attempt to make an online service unavailable to users by overloading the system.
8
9
5
4
10
7
2
1
3
6