Module 10: LAN Security Concepts Vocab

12345678910
Across
  1. 2. adds its own VLAN tags, one being its own tag
  2. 4. intrusive software that is designed to damage and mess with computers and computer systems
  3. 5. when a threat hijacks a valid IP address on another device on the subnet
  4. 7. an attack that has the ability to look at the all of the leasable IP and tries to lease them
  5. 9. able to take over a router without an aid of a router
  6. 10. Cisco proprietary protocol designed to facilitate the network management of Cisco devices by discovering hardware and protocol information about neighboring devices
Down
  1. 1. conducts an attack by spoofing the root bridge and changing the topology of a network
  2. 3. data servers or hosts that are compromised to steal confidential information
  3. 6. rouge DHCP server is connected to the network and provides a false IP configuration
  4. 8. provide the primary framework to set up access control on a network device