Modules 1-3 Terms and Command Crossword Puzzle

1234567891011121314151617181920212223242526272829303132333435
Across
  1. 5. A source or destination device, can be a computer, printer, phone, and more.
  2. 8. Is an area network, it usually uses cables to form a network within one limited area.
  3. 11. This command sets an encrypted password for the privileged exec mode.
  4. 13. A command that returns the user one configuration mode back in the configuration mode hierarchy.
  5. 15. A command that creates a message of the day, can be used to declare something on a device such as, "Unauthorized Access is Prohibited".
  6. 16. A private network of a company but, it can be accessed by authorized users such as customers, suppliers, or collaborators.
  7. 17. Dynamically assigns ipv4 or ipv6 addressing information to dhcpv4/v6 clients at start-up.
  8. 18. A command that returns the user to the privileged exec mode from any sub configuration mode.
  9. 21. Finds the best path for a packet from one router to another.
  10. 22. A specific organization or entity can use this to store and access data, can be expensive.
  11. 24. Allows a user to navigate through a system using icons, menus, and windows. It is not always stable and can fail.
  12. 25. Provides an insecure in-band cli connection, does not have any encryption.
  13. 27. Data Link layer PDU
  14. 28. Prioritizes traffic which allows for more important traffic to go first, such as video.
  15. 30. As data is sent down to other layers, those layers encapsulate that data then add a header and sometimes a trailer.
  16. 32. Provides an in-band remote cli connection with strong encryption.
  17. 34. It is an easily expandable network, it doesn't affect the functionality of the network while expanding it.
  18. 35. A command mode that uses the # as its prompt ending, allows users to enter global configuration mode, and can execute configuration commands.
Down
  1. 1. Allows users to use their own device to access information.
  2. 2. Is a stable and low resource intensive way of interacting with a system.
  3. 3. A private network for a specific organization or company. Only those in the company are allowed to use it.
  4. 4. Network layer PDU
  5. 6. A command mode that uses the > as its prompt ending and has limited basic monitoring commands.
  6. 7. Allows users to access and maintain emails on a mail server.
  7. 9. A command mode that can go into sub configuration modes and commands inputted affect the running-configuration of a device.
  8. 10. Transport layer PDU
  9. 12. Data is de-encapsulated as it is sent up to other layers, it also removes protocol headers as it goes through the process.
  10. 14. Connectionless communication protocol
  11. 19. A file transport protocol, it is connectionless, uses best-effort, and has unacknowledged file delivery.
  12. 20. A command that shows a list of possible commands that could be used at the current configuration mode and a list of what commands could be used that follow the input in the command line. Uses the symbol ?
  13. 23. Connects end devices, most often are routers, switches, or firewalls.
  14. 26. Operates at the network layer for Cisco, shows dynamic address mapping for an ipv4 address to a hardware address.
  15. 29. An area network that is able to connect companies over a large distance, even to different countries.
  16. 31. The smallest office space, can also be in homes.
  17. 33. Anyone can use this to access or store data, open for anyone to use.