Home
My Puzzles
FAQ
Report bug
Collected Puzzles
User listed puzzles
Random Puzzle
Log In/Out

Ethical Hacking Crossword

Stephen Duncan

A Crossword puzzle to help prepare for Ethical Hacking theory.

1
2
                       
 
3
                               
 
4
5
                       
     
     
   
6
                 
7
     
   
8
                               
       
 
9
                             
       
       
   
10
 
11
 
         
         
12
                           
         
       
13
                                 
   

Across
2.Ethical guidelines for ethical hackers. (3 Words)
3.The process of using scripts to search for vulnerabilities. (2 Words)
5.A tool used to capture and analyze network traffic. (2 Words)
6.A type of ethical hacking that focuses on applications. (2 Words)
8.A type of ethical hacking that focuses on tricking targets (2 Words)
9.A type of hacking that focuses on exploring radio waves. (2 Words)
12.Phishing attack where a malicious actor pretends to be someone else
13.A type of ethical hacking that involves testing a system's security before it is released to the public. (2 Words)
Down
1.A type of ethical hacking that involves attacking a system to identify and fix vulnerabilities. (2 Words)
4.A legal document that outlines the scope and limitations of an ethical hacking engagement (3 Words)
5.A type of ethical hacking that involves accessing a building or room (2 Words)
7.The process of gathering information about a target system.
10.Hacking that involves using social engineering
11.A vulnerability in a system that can be exploited to gain unauthorized access.

Use the "Printable HTML" button to get a clean page, in either HTML or PDF, that you can use your browser's print button to print. This page won't have buttons or ads, just your puzzle. The PDF format allows the web site to know how large a printer page is, and the fonts are scaled to fill the page. The PDF takes awhile to generate. Don't panic!




Google
 
Web armoredpenguin.com

Copyright information Privacy information Contact us