SRWE Module 10-13
Across
- 3. an attack in which an organization’s data servers or hosts are compromised to steal confidential information
- 7. Cisco device designed to monitor Simple Mail Transfer Protocol (SMTP)
- 9. the goal of this attack is to create a DoS for connecting clients
- 12. enables traffic from one VLAN to be seen by another VLAN without the aid of a router
- 14. provides stateful packet inspection, application visibility and control, a next-generation intrusion prevention system (NGIPS), advanced malware protection (AMP), and URL filtering
- 16. this occurs when a rogue DHCP server is connected to the network and provides false IP configuration parameters to legitimate clients
Down
- 1. mitigation technology for web-based threats
- 2. an attack in which an organization’s hosts are infected with malicious software
- 4. who is permitted to access a network
- 5. attack that is unidirectional and works only when the attacker is connected to a port residing in the same VLAN as the native VLAN of the trunk port
- 6. auditing what actions someone performed while accessing the network
- 8. what someone is allowed to access on a network
- 10. prevents DHCP starvation and DHCP spoofing attacks
- 11. coordinated attack from many devices
- 13. prevents many types of attacks including MAC address flooding attacks and DHCP starvation attacks
- 15. a proprietary Layer 2 link discovery protocol that is enabled on all Cisco devices by default