CyberSecurity Awareness Month Week 4

Edit Answers
IHWAFYNMCNGIRDCXRHNF DCLOUDQDUIKIQQTKLVWF EDATALEXPLOITPRAJONA TSWYMUEIGKSIMEASRLWL CHOOWBYLDBJXTDFUEWOA EHDCPGWSHFEOIEFJDWDC TJTGEWOCNYBSXMIEHHKI EESSHLWANYERNOCRAICH DBTTDISCONNECTWUTTOT IMAAIENTERPRISETZELE HVEHNJHUSYOIPZMPOHHN PIRKTLJITFIJBRPAMAGU SOHCECDNWZDOOBSCLTST TLTARAMHWKZUVNGGQHTB CASLCBRTOOOCSRRAVZRU ETMBERXXOYFQQIFOYEEB TIOVPEKLJSHIJACKTTLZ OOZLTINQAUSYUOCENAAM RNNWFISOLATEVGNWURPE PSBTAWCONDKMVENQOTPJ CLEGITIMATEOGHJLBLLE MBVOPOLICIESFKKMGIWW RDCABLECFACUADSMUFBA CNVCZZTAQHSOXIMXBNFB EDTJTDFVLPWGWWGDRIBJ
1.
cable
2.
data
3.
hijack
4.
infiltrate
5.
isolate
6.
disconnect
7.
traffic
8.
intercept
9.
capture
10.
bugbounty
11.
unethical
12.
redhat
13.
blackhat
14.
whitehat
15.
policies
16.
alerts
17.
exploit
18.
detected
19.
cloud
20.
ecrmcprotectsphi
21.
violations
22.
threats
23.
legitimate
24.
enterprise
25.
lockdown