Chapter 6 - Network Design Elements
Across
- 3. A cloud-based delivery model for security services like antivirus and firewalls.
- 5. A cloud model offering virtualized computing resources over the internet.
- 7. A network state where a device defaults to open access after failure.
- 10. A solution that enforces security policies before allowing network access.
- 13. A method of dialing many phone numbers to find modems or unsecured lines.
- 15. Impersonating a device's MAC address to bypass security.
- 17. An attack that allows access to traffic on other VLANs.
- 18. A network design using two firewalls to isolate a DMZ.
Down
- 1. A publicly shared list of known cybersecurity vulnerabilities and exposures.
- 2. A cloud model providing a platform for developers to build and deploy applications.
- 3. A protocol that prevents network loops by managing redundant paths.
- 4. A switch memory table that stores MAC-to-port mappings.
- 6. A cloud model where applications are delivered over the internet.
- 8. An attack that overwhelms a switch's memory with fake MAC addresses.
- 9. A one-to-one mapping between a private and public IP address.
- 11. A firewall setup with three interfaces: internal, external, and DMZ.
- 12. A method that modifies IP addresses to allow private devices to access the internet.
- 14. A buffer zone between internal networks and external, untrusted networks.
- 16. A type of NAT that maps multiple private IPs to one public IP using port numbers.