Lesson 16

123456789101112131415161718192021
Across
  1. 2. Key _____ generate a random number every few seconds that can be used for multifactor identification to gain access to a secure system such as a bank account.
  2. 4. Configuring IP ______ enables you to set which IP addresses are allowed to communicate through your router and which are not.
  3. 7. Configuring a _____ reservation means that you're setting aside a particular IP address to be used only with a specific device.
  4. 8. The security problem arises because an ____ software will no longer receive security updates, making your network vulnerable to attack.
  5. 10. _______ are any type of identification that uses a part of your body to identify you.
  6. 12. _____ day attacks happen the same day a vulnerability is discovered and attackers are able to evade antivirus programs because the antivirus companies have not had the time to respond to the vulnerability yet.
  7. 13. In _______, the user is required to provide two or more items proving who they are.
  8. 14. An unauthorized router with a seemingly legitimate configuration is specifically known as an evil _____.
  9. 15. ______ is an authentication protocol that was originally used for dial-in access.
  10. 17. _____ is when someone or something pretends to be something else, such as an attacker's server using a familiar look and feel of a website, even a similar IP.
  11. 18. _____ injection occurs when an attacker puts code into a database instead of data and the code is executed, giving the attacker access to the data in the database.
  12. 19. ______ store electronic information that could be used to access equipment as well.
  13. 21. _____ is similar to a SQL injection, except it uses a website and Hypertext Markup Language (HTML) or JavaScript instead of a database.
Down
  1. 1. Port _________ will send all traffic that comes in on a specified port number to a specific node on the network.
  2. 3. On a router this is called a ______ update because it is updating software that is embedded in chips on the router's circuit board
  3. 5. ______ is an attempt by someone or something to masquerade as someone else.
  4. 6. _____ is using phishing to go after a big target.
  5. 9. Your server is flooded with those responses and crashes. It's called a ____ attack because users who want to use the server for legitimate purposes such as placing an order are unable to due to all the malicious traffic.
  6. 10. _______ are vertical posts that are short and sturdy, sometimes made of cement or steel.
  7. 11. _______ is an authentication protocol developed by Cisco that is now an open standard.
  8. 16. An evil twin is when an unauthorized wireless access point (WAP) appears on your network, using your _____ and users are able to connect to the network using the unauthorized access point.
  9. 20. _____ is for wireless encryption and not authentication