week 3 part 1

12345678910111213141516171819202122232425262728293031
Across
  1. 7. an attack in which the source MAC address is changed in the header of a frame
  2. 9. Access control list is a router filter that controls which network packets are permitted (forwarded) or denied (dropped) in or out of a network
  3. 14. a switch feature that follows the 802.1x protocol to allow only authenticated devices to connect
  4. 19. Dynamic ARP Inspection a security feature on some switches that verifies each ARP request has a valid IP to MAC binding
  5. 22. unauthorized individuals try to breach a network from outside the network
  6. 23. perpetrators attempt to compromise or affect the operations of a system in some way
  7. 24. an attack in which the attacking host adds two VLAN tags instead of one to the header of the frames that it transmits
  8. 25. peer-to-peer software that allows users to share content without centralized servers or centralized access control
  9. 28. scans content to identify and dispose of phishing attempts
  10. 29. an attack in which the source MAC address is changed on frames sent by the attacker
  11. 30. a network device that transmits data from one network to another
  12. 31. an attack that overloads a switch’s MAC forwarding table to make the switch function like a hub
Down
  1. 1. a content filter that prevents users from visiting restricted websites
  2. 2. Virtual LAN a logical grouping of computers based on switch port
  3. 3. Dynamic Trunking Protocol is an unsecured protocol that could allow unauthorized devices to modify a switch’s configuration
  4. 4. Content-addressable Memory a table maintained by a switch that contains MAC addresses and their corresponding port locations
  5. 5. an unprotected and usually lesser known access method or pathway that may allow attackers access to system resources
  6. 6. a filter that prevents users from visiting websites with known malicious content
  7. 8. an email filter that prevents the delivery of irrelevant or inappropriate email known as spam
  8. 10. irrelevant or inappropriate email sent to a large number of recipients
  9. 11. Virtual LAN is a logical collection of devices that belong together and act as if they are connected to the same wire or physical switch
  10. 12. the normal network activity including typical traffic patterns, data usage, and server loads.
  11. 13. a location or device that allows network access and is vulnerable to attacks
  12. 15. Common Vulnerability and Exposures a repository of vulnerabilities hosted by MITRE corporation
  13. 16. initiated by authorized individuals inside the network’s security perimeter who attempt to access systems or resources to which they’re not authorized
  14. 17. Real-time text messaging communication that supports picture, music, and document exchange
  15. 18. a software bug or design flaw in an application that allows an attacker to gain access to system resources or additional privileges that aren’t typically available
  16. 20. a software vulnerability that is unknown to the vendor that can be exploited by attackers
  17. 21. the division of a network into smaller networks or pieces for performance or security reasons
  18. 25. perpetrators gather information without affecting the targeted network’s flow of information
  19. 26. Dynamic Host Configuration Protocol a security feature on some switches that filters out untrusted DHCP messages
  20. 27. an attack in which the attacker’s MAC address is associated with the IP address of a target’s device