Cyber Security
Across
- 3. prevents a local computer from using a URL or an IP address to gain access to the server
- 7. Legacy firewall
- 8. Point to point
- 10. blocks cookies
- 11. blocks internet requests from unknown sources
Down
- 1. block multicast
- 2. Layer 2 tunneling protocol pass through
- 4. Passthrough for ispec
- 5. blocks java
- 6. blocks ActiveX
- 9. blocks proxy servers