AP Networking
Across
- 5. The physical address of a NIC; used for port security filtering.
- 7. Legacy remote access protocol that sends data in plain text (Insecure!).
- 8. Password type that uses MD5 hashing for high security.
- 9. The embedded software/OS of the networking hardware.
- 12. Secure, encrypted replacement for Telnet (Port 22).
- 13. Command to manually disable an interface to prevent access.
- 15. Local management port used for initial device setup.
- 16. Recording system events to a buffer or server for "Accounting."
- 18. Command used to move from User EXEC to Privileged EXEC mode.
Down
- 1. Virtual lines used for remote management access.
- 2. Unsecured data that is readable by anyone (Avoid this!).
- 3. A legal notice displayed to users before login.
- 4. Framework for Authentication, Authorization, and Accounting.
- 6. Scrambling data so only authorized parties can read it.
- 10. A virtual interface used for testing and stable remote management.
- 11. Configuring a port to carry traffic for multiple VLANs.
- 14. Mathematical process used to scramble passwords for storage.
- 17. The most secure modern wireless encryption protocol.