Application Word Search

Edit Answers
GPYTKENCRYPTIONPUCNA LSBZNFLJWPHISHINGALE QADLBNUTOYKDUXVJHPLC PLTECHNOLOGYRACUQCAO QOSKZGREIOXJKWEWLIWZ NASIKCORSTPRMWCTPDEY NGIDVYTAOFOLNTUHKSRC RFEGDUDWNKMNJAAEMSIF TRMJAKAEKCQYNEVLTXFK SADUTCYLDERAORUAXDMS QMQPAARDPYGOIHXSXSOO RETVNTEDORQNTTZTLAGJ SWTMKTVIANSNAOYIMARX DOOECAOMFTBRCPSCZSOK ZRZTORCTPHXRIAAILEJM QKQSSEESSXRVLAXTLOMB IFOYZBRIZGTDPSUYWWUD DJPSVYLNGUGWPYYEBLSD UZNJNCTOPOVKAYURBWLY IAASPOHLVAQFMZSHNAAC
1.
APPLICATION
2.
CYBERATTACK
3.
FRAMEWORK
4.
PAAS
5.
SIEM
6.
TECHNOLOGY
7.
SAAS
8.
DATA
9.
IAAS
10.
PCIDSS
11.
SLA
12.
ELASTICITY
13.
CLOUD
14.
ENCRYPTION
15.
ISO
16.
PHISHING
17.
SOC
18.
THREAT
19.
MIDDLEWARE
20.
FIREWALL
21.
NIST
22.
RECOVERY
23.
SYSTEM
24.
UEBA