Chapter 12 - Behind the Scenes: Networking and Security in the Business World

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 5. a virtual interface that used to transmit data securely between two endpoints
  2. 6. provides clients on a network with information stored on a database.
  3. 9. gives wireless devices a sending and receiving connection point to the network.
  4. 11. An area of a private network accessible by customers.
  5. 14. Makes a decision on where to transmit packets based on the address sent to it.
  6. 15. Allows the exchange of a large amount of business data
  7. 20. Nodes are connected in a straight line on this topology.
  8. 21. is another name for a network adapter
  9. 25. Most efficient topology to set up an Ethernet network
  10. 29. acts as a go-between, connecting computers on the internal network with those on the external network (the Internet).
  11. 30. is the setting up of a computer system to attract unauthorised users/intruders
  12. 32. Connect two dissimilar networks.
  13. 33. Private network set up by a business to share data and resources.
  14. 34. most suspectable cable to electronic magnetic interference
  15. 35. More users can be added to the network without affecting the performance of other nodes.
  16. 36. requires two of the three authentications before authorization is granted.
  17. 39. listens on a network to ensure no other nodes are transmitting data and it is safe to transmit data.
  18. 40. is the set of rules governing the format of data sent via the internet or local network
Down
  1. 1. An arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
  2. 2. used to host websites to ensure it is accessible via the internet.
  3. 3. trying to access a system by entering multiple passcodes.
  4. 4. A bus network contains a single line of communication which has a limitation.
  5. 7. stores all data on a single server.
  6. 8. passwords and email addresses is one way to ensure the user accessing the system is legitimate.
  7. 10. involves having an external screening router examining incoming data packets to ensure that they originated from or are authorized by valid users on the internal network.
  8. 12. Each network adapter address is represented by this format 01:40:87:44:79:A5
  9. 13. is a special-purpose computer on a network specifically designed and configured to withstand attack
  10. 16. is a device that absorbs a signal so that it’s not reflected back onto parts of the network that have already received
  11. 17. physical or logical arrangement of computers, transmission media (cables), and other network components.
  12. 18. Security risk of incorrect data entered by us that affects the functioning of a network.
  13. 19. set of rules that govern how communication is done on a network.
  14. 22. perform the traffic directing functions on the Internet.
  15. 23. uses human features to determine whether a user is to be granted permission to the system
  16. 24. is a standard that defines how to establish and maintain a network conversation by which applications can exchange data.
  17. 26. Process and deliver incoming and outgoing emails
  18. 27. servers used to handle repetitive tasks.
  19. 28. Data flows around the circle from device to device in one direction only using a special data packet
  20. 31. another name for client/server network
  21. 37. each node participates in the moving of data along the network.
  22. 38. swipe cards used to access a secure facility.