CASP Exercise 1.1

1234567891011121314151617181920
Across
  1. 4. Rogue access points can intercept data flowing through the network, including
  2. 7. is a process that identifies a cellular phone or any other radio transmitter by the?
  3. 10. uses rules and heuristics to identify suspicious patterns of network behavior.
  4. 12. firewalls will need to actively support extension of security support and collaboration for selective user communities within an enterprise.
  5. 13. has two security modes
  6. 14. uses open protocols to control the virtual and physical devices responsible for routing the data packets.
  7. 15. locks down DNS like a digital fortress, protecting you from fake websites and ensuring reliable domain lookups
  8. 17. Rogue devices can spoof?
  9. 18. allows good traffic and blocks all other.
  10. 20. Evenly distributing tasks helps maintain high throughput, allowing systems to handle more requests simultaneously.
Down
  1. 1. Wireless attack tool
  2. 2. vulnerability where an attacker inserts malicious SQL code into an application’s input fields
  3. 3. This security tool runs on Windows Server and can process packet capture files generated by Snort.
  4. 5. analyzes network packets for attack signatures—unique characteristics or behaviors that are associated with a specific threat.
  5. 6. monitors network traffic, analyzing packets to identify suspicious patterns or known attack signatures.
  6. 8. It messes with Wi-Fi signals.
  7. 9. allows all traffic and only blocks known bad traffic.
  8. 11. It spies on nearby networks.
  9. 12. Not only does it detect suspicious activity, but it also actively prevents attacks.
  10. 16. ensures only authorized users and trusted devices can enter a network.
  11. 19. Benefits are Privacy, Security, Access