Class Activity 1

123456789101112131415161718
Across
  1. 2. is one of the media types.
  2. 5. every computer connected to a network is called a ___.
  3. 6. ____ is one of the goals of network security.
  4. 10. enables computer within a home or remote office to connect to a corporate network.
  5. 12. _______ network is a term used in a network to allow multiple services or data types to be carried by a single link.
  6. 13. _____ topology is referring to how data is sent from one node to another node.
  7. 15. ________ concept is needed in order to provide 24/7 of reliable services and internet connection.
  8. 16. this intermediary device connects end devices together.
  9. 18. ____ is one of the ways to remotely access to the intermediary device where the data is transmitted in plain text.
Down
  1. 1. this hardware connects different LANs together.
  2. 3. ____ an intranet that can be partially accessed by authorized outside users like suppliers, customers, collaborators.
  3. 4. _____topology is referring to how the devices are connected in a network.
  4. 6. physical port is also known as _____
  5. 7. ____ is a private network internal to an organization that is meant to be accessible to the organization members.
  6. 8. _____ is a new networking trend nowadays that affect the organizations and consumers.
  7. 9. _______ command is needed if we want to change the name of the intermediary device.
  8. 10. to provide an encrypted password for the privilege mode of a switch is via providing ______ command.
  9. 11. is a machine that sends a request to a server.
  10. 14. on ____ exec mode allows you to access only basic monitoring commands like show command.
  11. 17. ____ is a large geographical area netwrok typically involving a telecommunications service provider.