Cybersecurity Fundamental Chapter 6 Part 2

12345678910111213141516
Across
  1. 5. in conjunction with one or more other routers attached to a lan.
  2. 8. updates and backup location periodically and in the most bandwidth conservative options.
  3. 12. it requires less bandwidth and sites can be further apart because latency is less of an issue.
  4. 13. allow for faster recovery if someone maliciously or unintentionally reformats flash memory or erases the startup configuration file.
  5. 14. detection systems monitor the traffic on a network.
  6. 15. a cisco ios technology that provides statistics on packets flowing through a cisco router or multilayer switch.
  7. 16. labor events, social-political events, material events and utilities disruptions.
Down
  1. 1. allows network access for authorized users with compliant systems.
  2. 2. ability to react to problems in one of its components while still functioning.
  3. 3. provide high network availability by providing first-hop routing redundancy.
  4. 4. protects data traffic from a failed router or circuit, while also allowing load balancing between a group of redundant routers.
  5. 6. it can detect and immediately address a network problem.
  6. 7. requires high bandwidth and locations must be close together to reduce latency.
  7. 9. investigate the cause of the incident and ask questions to better understand the nature of the threat.
  8. 10. a network protocol that provides for redundancy.
  9. 11. discovering the incident.