CHAPTER 18 TERMS

123456789101112131415161718192021222324252627
Across
  1. 3. Processor, memory, hard-disk or other storage subsystem, and wired/wireless utilization.
  2. 6. date and time of a message.
  3. 12. detects unwanted attempts to manipulate network systems and/or environments
  4. 13. looks inside every packet on a network segment.
  5. 16. a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
  6. 17. the facility to which the message refers.
  7. 18. is a computer security device that monitors network and/or system activities for any strange or malicious behavior
  8. 21. text string containing detailed information about the even being reported.
  9. 22. supports plaintext authentication with community strings and uses only UDP.
  10. 23. scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
  11. 25. protocol analyzers such as load testing, connectivity testing, and throughput testing.
  12. 26. a text string that uniquely describes the message.
  13. 27. a single digit code from 0 to 7 that indicates the severity of the message.
Down
  1. 1. a powerful enterprise (large corporate environment) network intrusion and prevention system.
  2. 2. most popular form of TCP scanning
  3. 4. a device that test the speed of data transfer in the network.
  4. 5. sends messages to the NMS station, which then either reads or writes information in the database, stored on the NMS.
  5. 7. stores messages from you and can even time stamp and sequence them for you. Allows you to display, sort, and even search messages.
  6. 8. a software tool designed to search a host for open ports.
  7. 9. a device that test the speed of data transfer in the network.
  8. 10. displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
  9. 11. the standard level of performance of a certain device or to the normal operating capacity for your whole network.
  10. 14. the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
  11. 15. an Application layer protocol that provides a message format for agents on a variety of devices to communicate with network management stations.
  12. 19. Supports plaintext authentication with MD5 or SHA with no encryption but provides GET BULK.
  13. 20. Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers.
  14. 24. used for sniffing wireless networks