Cyber Security

1234567891011
Across
  1. 3. prevents a local computer from using a URL or an IP address to gain access to the server
  2. 7. Legacy firewall
  3. 8. Point to point
  4. 10. blocks cookies
  5. 11. blocks internet requests from unknown sources
Down
  1. 1. block multicast
  2. 2. Layer 2 tunneling protocol pass through
  3. 4. Passthrough for ispec
  4. 5. blocks java
  5. 6. blocks ActiveX
  6. 9. blocks proxy servers