Across
- 7. an attack in which the source MAC address is changed in the header of a frame
- 9. Access control list is a router filter that controls which network packets are permitted (forwarded) or denied (dropped) in or out of a network
- 14. a switch feature that follows the 802.1x protocol to allow only authenticated devices to connect
- 19. Dynamic ARP Inspection a security feature on some switches that verifies each ARP request has a valid IP to MAC binding
- 22. unauthorized individuals try to breach a network from outside the network
- 23. perpetrators attempt to compromise or affect the operations of a system in some way
- 24. an attack in which the attacking host adds two VLAN tags instead of one to the header of the frames that it transmits
- 25. peer-to-peer software that allows users to share content without centralized servers or centralized access control
- 28. scans content to identify and dispose of phishing attempts
- 29. an attack in which the source MAC address is changed on frames sent by the attacker
- 30. a network device that transmits data from one network to another
- 31. an attack that overloads a switch’s MAC forwarding table to make the switch function like a hub
Down
- 1. a content filter that prevents users from visiting restricted websites
- 2. Virtual LAN a logical grouping of computers based on switch port
- 3. Dynamic Trunking Protocol is an unsecured protocol that could allow unauthorized devices to modify a switch’s configuration
- 4. Content-addressable Memory a table maintained by a switch that contains MAC addresses and their corresponding port locations
- 5. an unprotected and usually lesser known access method or pathway that may allow attackers access to system resources
- 6. a filter that prevents users from visiting websites with known malicious content
- 8. an email filter that prevents the delivery of irrelevant or inappropriate email known as spam
- 10. irrelevant or inappropriate email sent to a large number of recipients
- 11. Virtual LAN is a logical collection of devices that belong together and act as if they are connected to the same wire or physical switch
- 12. the normal network activity including typical traffic patterns, data usage, and server loads.
- 13. a location or device that allows network access and is vulnerable to attacks
- 15. Common Vulnerability and Exposures a repository of vulnerabilities hosted by MITRE corporation
- 16. initiated by authorized individuals inside the network’s security perimeter who attempt to access systems or resources to which they’re not authorized
- 17. Real-time text messaging communication that supports picture, music, and document exchange
- 18. a software bug or design flaw in an application that allows an attacker to gain access to system resources or additional privileges that aren’t typically available
- 20. a software vulnerability that is unknown to the vendor that can be exploited by attackers
- 21. the division of a network into smaller networks or pieces for performance or security reasons
- 25. perpetrators gather information without affecting the targeted network’s flow of information
- 26. Dynamic Host Configuration Protocol a security feature on some switches that filters out untrusted DHCP messages
- 27. an attack in which the attacker’s MAC address is associated with the IP address of a target’s device
