SRWE Module 10-13

12345678910111213141516
Across
  1. 3. an attack in which an organization’s data servers or hosts are compromised to steal confidential information
  2. 7. Cisco device designed to monitor Simple Mail Transfer Protocol (SMTP)
  3. 9. the goal of this attack is to create a DoS for connecting clients
  4. 12. enables traffic from one VLAN to be seen by another VLAN without the aid of a router
  5. 14. provides stateful packet inspection, application visibility and control, a next-generation intrusion prevention system (NGIPS), advanced malware protection (AMP), and URL filtering
  6. 16. this occurs when a rogue DHCP server is connected to the network and provides false IP configuration parameters to legitimate clients
Down
  1. 1. mitigation technology for web-based threats
  2. 2. an attack in which an organization’s hosts are infected with malicious software
  3. 4. who is permitted to access a network
  4. 5. attack that is unidirectional and works only when the attacker is connected to a port residing in the same VLAN as the native VLAN of the trunk port
  5. 6. auditing what actions someone performed while accessing the network
  6. 8. what someone is allowed to access on a network
  7. 10. prevents DHCP starvation and DHCP spoofing attacks
  8. 11. coordinated attack from many devices
  9. 13. prevents many types of attacks including MAC address flooding attacks and DHCP starvation attacks
  10. 15. a proprietary Layer 2 link discovery protocol that is enabled on all Cisco devices by default