Lesson 16
Across
- 2. Key _____ generate a random number every few seconds that can be used for multifactor identification to gain access to a secure system such as a bank account.
- 4. Configuring IP ______ enables you to set which IP addresses are allowed to communicate through your router and which are not.
- 7. Configuring a _____ reservation means that you're setting aside a particular IP address to be used only with a specific device.
- 8. The security problem arises because an ____ software will no longer receive security updates, making your network vulnerable to attack.
- 10. _______ are any type of identification that uses a part of your body to identify you.
- 12. _____ day attacks happen the same day a vulnerability is discovered and attackers are able to evade antivirus programs because the antivirus companies have not had the time to respond to the vulnerability yet.
- 13. In _______, the user is required to provide two or more items proving who they are.
- 14. An unauthorized router with a seemingly legitimate configuration is specifically known as an evil _____.
- 15. ______ is an authentication protocol that was originally used for dial-in access.
- 17. _____ is when someone or something pretends to be something else, such as an attacker's server using a familiar look and feel of a website, even a similar IP.
- 18. _____ injection occurs when an attacker puts code into a database instead of data and the code is executed, giving the attacker access to the data in the database.
- 19. ______ store electronic information that could be used to access equipment as well.
- 21. _____ is similar to a SQL injection, except it uses a website and Hypertext Markup Language (HTML) or JavaScript instead of a database.
Down
- 1. Port _________ will send all traffic that comes in on a specified port number to a specific node on the network.
- 3. On a router this is called a ______ update because it is updating software that is embedded in chips on the router's circuit board
- 5. ______ is an attempt by someone or something to masquerade as someone else.
- 6. _____ is using phishing to go after a big target.
- 9. Your server is flooded with those responses and crashes. It's called a ____ attack because users who want to use the server for legitimate purposes such as placing an order are unable to due to all the malicious traffic.
- 10. _______ are vertical posts that are short and sturdy, sometimes made of cement or steel.
- 11. _______ is an authentication protocol developed by Cisco that is now an open standard.
- 16. An evil twin is when an unauthorized wireless access point (WAP) appears on your network, using your _____ and users are able to connect to the network using the unauthorized access point.
- 20. _____ is for wireless encryption and not authentication