Across
- 2. adds its own VLAN tags, one being its own tag
- 4. intrusive software that is designed to damage and mess with computers and computer systems
- 5. when a threat hijacks a valid IP address on another device on the subnet
- 7. an attack that has the ability to look at the all of the leasable IP and tries to lease them
- 9. able to take over a router without an aid of a router
- 10. Cisco proprietary protocol designed to facilitate the network management of Cisco devices by discovering hardware and protocol information about neighboring devices
Down
- 1. conducts an attack by spoofing the root bridge and changing the topology of a network
- 3. data servers or hosts that are compromised to steal confidential information
- 6. rouge DHCP server is connected to the network and provides a false IP configuration
- 8. provide the primary framework to set up access control on a network device
