The Ultimate Crossword Challenge: Places, Food & Cybersecurity

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657
Across
  1. 1. A sweet, fizzy drink. (4 letters)
  2. 2. The place in Kerala where you can see beautiful backwaters.
  3. 5. A security policy that blocks all traffic by default and only permits what's necessary. (5 letters)
  4. 6. A highly precise timing device used for network synchronization. (3 letters)
  5. 8. The process of scrambling data to protect it. (11 letters)
  6. 10. The broad term for protecting information and systems. (8 letters)
  7. 11. The "V" in a secure tunnel. (7 letters)
  8. 12. The term for prioritizing network traffic to guarantee performance. (3 letters)
  9. 13. An authentication protocol that separates AAA functions and relies on TCP. (7 letters)
  10. 14. A security method requiring two or more forms of verification for user login. (3 letters)
  11. 15. The practice of Hacking the networks and privacy data. (10 letters)
  12. 16. The management dashboard for the Nutanix platform. (5 letters)
  13. 18. Abbreviation for Industrial Automation and Control Systems. (4 letters)
  14. 22. A scam that tricks people into giving away personal information via email. (7 letters)
  15. 27. This city in Uttar Pradesh is one of the oldest in the world.
  16. 28. An unauthorized program that spies on your computer. (8 letters)
  17. 30. A malicious software that replicates itself. (5 letters)
  18. 31. An algorithmic-based protocol that automatically calculates optimal paths. (7 letters)
  19. 32. A famous temple complex in Odisha with a chariot shape.
  20. 35. A person who reports security vulnerabilities. (10 letters)
  21. 37. The state in the northeast known for its beautiful tea plantations.
  22. 39. A subnetting method that uses one size for all subnets, leading to potential waste. (5 letters)
  23. 42. The main component of the Nutanix platform that virtualizes the storage and compute. (9 letters)
  24. 44. A malicious program that records keystrokes on a user's device. (9 letters)
  25. 45. A protocol that combines authentication and authorization, and uses UDP. (6 letters)
  26. 46. The protocol used to synchronize network clocks over a packet-switched network. (3 letters)
  27. 50. An acronym for an encrypted tunnel established across a public network. (3 letters)
  28. 51. A Layer 2 service that emulates a bridged LAN across an IP/MPLS core. (4 letters)
  29. 52. The company that operates the IACS. (5 letters)
  30. 54. A traffic "gatekeeper" that uses algorithms to distribute requests to a backend pool. (12 letters)
  31. 56. A network segment where data packets can "collide" with each other. (8 letters)
  32. 57. A routing table that's isolated from others on a single router. (3 letters)
Down
  1. 1. A company that provides components for an IACS. (8 letters)
  2. 3. The place in Delhi where the Prime Minister addresses the nation.
  3. 4. The highest peak in India, located in the Himalayas.
  4. 5. The company that designs and builds the IACS. (10 letters)
  5. 6. The famous rock fortress in Madhya Pradesh
  6. 7. The technology that provides central orchestration and path selection across a WAN. (6 letters)
  7. 9. A logical network segment where all devices receive the same broadcast messages. (14 letters)
  8. 17. The coastal city famous for its Gateway and Bollywood.
  9. 19. A sweet snack often found with a hole in the middle. (6 letters)
  10. 20. A type of network attack that can overwhelm a server with traffic. (3 letters)
  11. 21. A system that actively blocks or prevents malicious activity based on predefined rules. (3 letters)
  12. 23. A cold, creamy dessert often served in a cone. (9 letters)
  13. 24. Rajasthan's colorful capital.
  14. 25. A wall that filters network traffic. (8 letters)
  15. 26. A California city synonymous with next-generation firewalls that use App-ID. (8 letters)
  16. 29. The opposite of a manually configured network path. (7 letters)
  17. 33. The opposite of a uniform subnet mask. (8 letters)
  18. 34. A person who gains unauthorized access to computer systems. (6 letters)
  19. 36. A marble mausoleum.
  20. 38. A popular topping for pizza, made from tomatoes. (5 letters)
  21. 40. A networking device used by Cisco to connect different networks. (6 letters)
  22. 41. A program that looks legitimate but is malicious. (6 letters)
  23. 43. A router that operates at Layer 3 to forward data based on a short, fixed-length identifier. (4 letters)
  24. 47. A security measure that prevents unauthorized devices from connecting to a switch port. (12 letters)
  25. 48. A series of characters used to verify a user's identity. (8 letters)
  26. 49. A converged network architecture for industrial automation, a joint standard by Rockwell and Cisco. (13 letters)
  27. 53. The network layer responsible for IP addressing. (7 letters)
  28. 55. A subnetting method that allows for different subnet sizes to conserve IP addresses. (4 letters)