Across
- 4. Rogue access points can intercept data flowing through the network, including
- 7. is a process that identifies a cellular phone or any other radio transmitter by the?
- 10. uses rules and heuristics to identify suspicious patterns of network behavior.
- 12. firewalls will need to actively support extension of security support and collaboration for selective user communities within an enterprise.
- 13. has two security modes
- 14. uses open protocols to control the virtual and physical devices responsible for routing the data packets.
- 15. locks down DNS like a digital fortress, protecting you from fake websites and ensuring reliable domain lookups
- 17. Rogue devices can spoof?
- 18. allows good traffic and blocks all other.
- 20. Evenly distributing tasks helps maintain high throughput, allowing systems to handle more requests simultaneously.
Down
- 1. Wireless attack tool
- 2. vulnerability where an attacker inserts malicious SQL code into an application’s input fields
- 3. This security tool runs on Windows Server and can process packet capture files generated by Snort.
- 5. analyzes network packets for attack signatures—unique characteristics or behaviors that are associated with a specific threat.
- 6. monitors network traffic, analyzing packets to identify suspicious patterns or known attack signatures.
- 8. It messes with Wi-Fi signals.
- 9. allows all traffic and only blocks known bad traffic.
- 11. It spies on nearby networks.
- 12. Not only does it detect suspicious activity, but it also actively prevents attacks.
- 16. ensures only authorized users and trusted devices can enter a network.
- 19. Benefits are Privacy, Security, Access
