Learn by fun 5

1234567891011121314
Across
  1. 4. on demand routing protocols are vulnerable to---attack
  2. 5. Attack in application layer
  3. 7. false advertiser
  4. 8. packet replication attack replicates - - - - - packets
  5. 12. DDoS attack is
  6. 13. is used to overcome external attack
  7. 14. FHSS overcomes------attack
Down
  1. 1. the protocol vulnerable to routing table overflow is
  2. 2. attacker in a tunnel
  3. 3. - - - - - happens in impersonation attack
  4. 6. - - - - occurs due to routing table poisoning
  5. 7. non optimal route attacker
  6. 9. man in the - - - - - - is called as MiM
  7. 10. information disclosure means - - - - of confidential data
  8. 11. - - - - - attack does not affects the network