Icon Créer jeu Créer jeu

Defense Against Cloud Attacks

Mots Croisés

(21)
Learn about the purpose of Microsoft Defender

Téléchargez la version pour jouer sur papier

Âge recommandé: 17 ans
296 fois fait

Créé par

United States

Top 10 résultats

Il n'y a toujours pas de résultats pour ce jeu. Soyez le premier à apparaître dans le classement! pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
 
game-icon

Mots Croisés

Defense Against Cloud AttacksVersion en ligne

Learn about the purpose of Microsoft Defender

par Carol Merchant
1

__________ requires those who have access to data and applications to keep details private within an organization

2

_________ requires that data (either at rest or in transit) cannot be intercepted or changed in any way that isn’t authorized.

3

Make sure that all services, resources and applications have redundancy in multiple regions to keep network “up and going.”

4

A distributed denial of service or ______ attack is a malicious attempt to make an online service unavailable to users by overloading the system.

5

Attackers create _______ networks to flood a website/server with traffic until it crashes.

6

Microsoft _______ protects cloud-based applications from various cyber threats and vulnerabilities and is effective against common malware and viruses

7

________ are physical devices that connect to and exchange information with a computer network. Examples include mobile devices, desktop computers, virtual machines, embedded devices, and servers.

8

In the 3 point strategy of Microsoft Defender, you must continuously _________ - to know your security posture, identify and track vulnerabilities.

9

In the 3 point strategy of Microsoft Defender, you must ______ your network by hardening resources and services.

10

In the 3 point strategy of Microsoft Defender, you must ______ your network to detect and resolve threats to resources, workloads and services.

5
8
3
4
7
6
1
10
9
educaplay suscripción