Modules 1-3 Terms and Command Crossword Puzzle

1234567891011121314151617181920212223242526272829303132
Across
  1. 1. Connectionless communication protocol
  2. 4. A private network for a specific organization or company. Only those in the company are allowed to use it.
  3. 5. Provides an insecure in-band cli connection, does not have any encryption.
  4. 6. Provides an in-band remote cli connection with strong encryption.
  5. 12. Allows users to use their own device to access information.
  6. 14. Data is de-encapsulated as it is sent up to other layers, it also removes protocol headers as it goes through the process.
  7. 18. Operates at the network layer for Cisco, shows dynamic address mapping for an ipv4 address to a hardware address.
  8. 19. A source or destination device, can be a computer, printer, phone, and more.
  9. 21. A command mode that can go into sub configuration modes and commands inputted affect the running-configuration of a device.
  10. 23. Is a stable and low resource intensive way of interacting with a system.
  11. 24. A command that returns the user one configuration mode back in the configuration mode hierarchy.
  12. 27. Connects end devices, most often are routers, switches, or firewalls.
  13. 28. A file transport protocol, it is connectionless, uses best-effort, and has unacknowledged file delivery.
  14. 31. Is an area network, it usually uses cables to form a network within one limited area.
  15. 32. A command mode that uses the > as its prompt ending and has limited basic monitoring commands.
Down
  1. 2. Network layer PDU
  2. 3. A command mode that uses the # as its prompt ending, allows users to enter global configuration mode, and can execute configuration commands.
  3. 4. Allows users to access and maintain emails on a mail server.
  4. 6. The smallest office space, can also be in homes.
  5. 7. A command that returns the user to the privileged exec mode from any sub configuration mode.
  6. 8. Prioritizes traffic which allows for more important traffic to go first, such as video.
  7. 9. A private network of a company but, it can be accessed by authorized users such as customers, suppliers, or collaborators.
  8. 10. A command that shows a list of possible commands that could be used at the current configuration mode and a list of what commands could be used that follow the input in the command line. Uses the symbol ?
  9. 11. An area network that is able to connect companies over a large distance, even to different countries.
  10. 12. A command that creates a message of the day, can be used to declare something on a device such as, "Unauthorized Access is Prohibited".
  11. 13. Finds the best path for a packet from one router to another.
  12. 15. This command sets an encrypted password for the privileged exec mode.
  13. 16. Allows a user to navigate through a system using icons, menus, and windows. It is not always stable and can fail.
  14. 17. It is an easily expandable network, it doesn't affect the functionality of the network while expanding it.
  15. 20. Dynamically assigns ipv4 or ipv6 addressing information to dhcpv4/v6 clients at start-up.
  16. 22. Transport layer PDU
  17. 25. As data is sent down to other layers, those layers encapsulate that data then add a header and sometimes a trailer.
  18. 26. Data Link layer PDU
  19. 29. Anyone can use this to access or store data, open for anyone to use.
  20. 30. A specific organization or entity can use this to store and access data, can be expensive.