Modules 1-3 Terms and Command Crossword Puzzle

1234567891011121314151617181920212223242526272829303132333435
Across
  1. 2. Provides an in-band remote cli connection with strong encryption.
  2. 7. Network layer PDU
  3. 9. The smallest office space, can also be in homes.
  4. 12. A source or destination device, can be a computer, printer, phone, and more.
  5. 13. As data is sent down to other layers, those layers encapsulate that data then add a header and sometimes a trailer.
  6. 14. A specific organization or entity can use this to store and access data, can be expensive.
  7. 19. Prioritizes traffic which allows for more important traffic to go first, such as video.
  8. 21. Connectionless communication protocol
  9. 22. A private network for a specific organization or company. Only those in the company are allowed to use it.
  10. 25. Transport layer PDU
  11. 28. A command mode that uses the # as its prompt ending, allows users to enter global configuration mode, and can execute configuration commands.
  12. 30. Allows users to use their own device to access information.
  13. 32. A command that returns the user to the privileged exec mode from any sub configuration mode.
  14. 33. This command sets an encrypted password for the privileged exec mode.
  15. 35. It is an easily expandable network, it doesn't affect the functionality of the network while expanding it.
Down
  1. 1. Anyone can use this to access or store data, open for anyone to use.
  2. 3. A command that shows a list of possible commands that could be used at the current configuration mode and a list of what commands could be used that follow the input in the command line. Uses the symbol ?
  3. 4. Operates at the network layer for Cisco, shows dynamic address mapping for an ipv4 address to a hardware address.
  4. 5. Dynamically assigns ipv4 or ipv6 addressing information to dhcpv4/v6 clients at start-up.
  5. 6. Data is de-encapsulated as it is sent up to other layers, it also removes protocol headers as it goes through the process.
  6. 8. A command mode that uses the > as its prompt ending and has limited basic monitoring commands.
  7. 10. Is a stable and low resource intensive way of interacting with a system.
  8. 11. A private network of a company but, it can be accessed by authorized users such as customers, suppliers, or collaborators.
  9. 15. Connects end devices, most often are routers, switches, or firewalls.
  10. 16. Finds the best path for a packet from one router to another.
  11. 17. Data Link layer PDU
  12. 18. Is an area network, it usually uses cables to form a network within one limited area.
  13. 20. A command that creates a message of the day, can be used to declare something on a device such as, "Unauthorized Access is Prohibited".
  14. 23. A file transport protocol, it is connectionless, uses best-effort, and has unacknowledged file delivery.
  15. 24. Allows a user to navigate through a system using icons, menus, and windows. It is not always stable and can fail.
  16. 26. A command mode that can go into sub configuration modes and commands inputted affect the running-configuration of a device.
  17. 27. A command that returns the user one configuration mode back in the configuration mode hierarchy.
  18. 29. Allows users to access and maintain emails on a mail server.
  19. 31. Provides an insecure in-band cli connection, does not have any encryption.
  20. 34. An area network that is able to connect companies over a large distance, even to different countries.