Across
- 1. A sweet, fizzy drink. (4 letters)
- 2. The place in Kerala where you can see beautiful backwaters.
- 5. A security policy that blocks all traffic by default and only permits what's necessary. (5 letters)
- 6. A highly precise timing device used for network synchronization. (3 letters)
- 8. The process of scrambling data to protect it. (11 letters)
- 10. The broad term for protecting information and systems. (8 letters)
- 11. The "V" in a secure tunnel. (7 letters)
- 12. The term for prioritizing network traffic to guarantee performance. (3 letters)
- 13. An authentication protocol that separates AAA functions and relies on TCP. (7 letters)
- 14. A security method requiring two or more forms of verification for user login. (3 letters)
- 15. The practice of Hacking the networks and privacy data. (10 letters)
- 16. The management dashboard for the Nutanix platform. (5 letters)
- 18. Abbreviation for Industrial Automation and Control Systems. (4 letters)
- 22. A scam that tricks people into giving away personal information via email. (7 letters)
- 27. This city in Uttar Pradesh is one of the oldest in the world.
- 28. An unauthorized program that spies on your computer. (8 letters)
- 30. A malicious software that replicates itself. (5 letters)
- 31. An algorithmic-based protocol that automatically calculates optimal paths. (7 letters)
- 32. A famous temple complex in Odisha with a chariot shape.
- 35. A person who reports security vulnerabilities. (10 letters)
- 37. The state in the northeast known for its beautiful tea plantations.
- 39. A subnetting method that uses one size for all subnets, leading to potential waste. (5 letters)
- 42. The main component of the Nutanix platform that virtualizes the storage and compute. (9 letters)
- 44. A malicious program that records keystrokes on a user's device. (9 letters)
- 45. A protocol that combines authentication and authorization, and uses UDP. (6 letters)
- 46. The protocol used to synchronize network clocks over a packet-switched network. (3 letters)
- 50. An acronym for an encrypted tunnel established across a public network. (3 letters)
- 51. A Layer 2 service that emulates a bridged LAN across an IP/MPLS core. (4 letters)
- 52. The company that operates the IACS. (5 letters)
- 54. A traffic "gatekeeper" that uses algorithms to distribute requests to a backend pool. (12 letters)
- 56. A network segment where data packets can "collide" with each other. (8 letters)
- 57. A routing table that's isolated from others on a single router. (3 letters)
Down
- 1. A company that provides components for an IACS. (8 letters)
- 3. The place in Delhi where the Prime Minister addresses the nation.
- 4. The highest peak in India, located in the Himalayas.
- 5. The company that designs and builds the IACS. (10 letters)
- 6. The famous rock fortress in Madhya Pradesh
- 7. The technology that provides central orchestration and path selection across a WAN. (6 letters)
- 9. A logical network segment where all devices receive the same broadcast messages. (14 letters)
- 17. The coastal city famous for its Gateway and Bollywood.
- 19. A sweet snack often found with a hole in the middle. (6 letters)
- 20. A type of network attack that can overwhelm a server with traffic. (3 letters)
- 21. A system that actively blocks or prevents malicious activity based on predefined rules. (3 letters)
- 23. A cold, creamy dessert often served in a cone. (9 letters)
- 24. Rajasthan's colorful capital.
- 25. A wall that filters network traffic. (8 letters)
- 26. A California city synonymous with next-generation firewalls that use App-ID. (8 letters)
- 29. The opposite of a manually configured network path. (7 letters)
- 33. The opposite of a uniform subnet mask. (8 letters)
- 34. A person who gains unauthorized access to computer systems. (6 letters)
- 36. A marble mausoleum.
- 38. A popular topping for pizza, made from tomatoes. (5 letters)
- 40. A networking device used by Cisco to connect different networks. (6 letters)
- 41. A program that looks legitimate but is malicious. (6 letters)
- 43. A router that operates at Layer 3 to forward data based on a short, fixed-length identifier. (4 letters)
- 47. A security measure that prevents unauthorized devices from connecting to a switch port. (12 letters)
- 48. A series of characters used to verify a user's identity. (8 letters)
- 49. A converged network architecture for industrial automation, a joint standard by Rockwell and Cisco. (13 letters)
- 53. The network layer responsible for IP addressing. (7 letters)
- 55. A subnetting method that allows for different subnet sizes to conserve IP addresses. (4 letters)
