Cybersecurity Fundamental Chapter 7 Part 2
Across
- 9. dedicated site that monitor, assesses, and defends the organization's information system.
- 10. can supplement or in some cases, replace security guards.
- 12. hardware or software solutions that enforce network security policies. Filters unauthorize or potentially dangerous traffic from entering the network.
- 13. uses network to make or receive phone calls.
Down
- 1. one of the faster sectors of information technology is the use of intelligent devices and sensors.
- 2. allows two or more locations to communicate simultaneously using telecommunication technologies.
- 3. logs the transaction for later retrieval.
- 4. one or more location containing the tools that provide administrators with a detail status of the organization's network.
- 5. form the backbone of the internet and communications between different
- 6. the outermost layer of security, and these solutions are the most publicly visible.
- 7. can be the foundation of highly secure identification and personal verification solutions.
- 8. allows an individual to gain access to an area with automated entry points.
- 11. provide a way to group devices within a LAN and on individual switches. use logical connections instead of physical connections.