CHAPTER 18 TERMS
Across
- 4. detects unwanted attempts to manipulate network systems and/or environments
- 6. most popular form of TCP scanning
- 7. a device that test the speed of data transfer in the network.
- 8. is a computer security device that monitors network and/or system activities for any strange or malicious behavior
- 10. used for sniffing wireless networks
- 11. scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
- 12. a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
Down
- 1. a powerful enterprise (large corporate environment) network intrusion and prevention system.
- 2. looks inside every packet on a network segment.
- 3. the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
- 5. displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
- 9. a software tool designed to search a host for open ports.