U03 - CSE-CH7

1234567891011121314
Across
  1. 4. (4-5,8) is a program that runs on a computer to allow or deny traffic between the computer and other connected computers. It applies a set of rules to data transmissions through inspection and filtering of data packets.
  2. 5. is hardware or software solutions that enforce network security policies. This can filters unauthorized or potentially dangerous traffic from entering the network.
  3. 9. (6,5) is a protocol that provides a secure (encrypted) management connection to a remote device.
  4. 10. (9,9,6) A host intrusion detection system is software that runs on a host computer that monitors suspicious activity.
  5. 12. This is code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack.
  6. 13. can provide a way to group devices within a LAN and on individual switches. They use logical connections instead of physical connections.
  7. 14. (8,5) An administrator should look at every service to verify its necessity and evaluate its risk. Remove any unnecessary services.
Down
  1. 1. (6,14) also called two-way authentication, is a process or technology in which both entities in a communications link authenticate to each other.
  2. 2. (2-2,9,6) was the computer industry’s response to the weakness of the previous WEP standard. The WPA2 standard provided several security improvements.
  3. 3. (4,6) “freezes” the hard drive partition. When a user restarts the system, the system reverts to its frozen configuration. The system does not save any changes that the user makes.
  4. 6. (5,6) In most networks that use Windows computers, an administrator configures these to ensure groups and setting policy at a group level i.e. access to USB devices
  5. 7. these form the backbone of the Internet and communications between different networks. They communicate with one another to identify the best possible path to deliver traffic to different networks.
  6. 8. (7,7,7) A private network that connects remote sites or users together over a public network, like the Internet.
  7. 11. (4,7) copies the contents of the computer’s hard disk to an image file.