Across
- 4. Variation in delay across an IP network.
- 5. Layer of a network that represents the network edge.
- 6. Topology used when doing SDN(5,4).
- 8. One major benefit of VPNs.
- 11. QoS method that treats all packets the same(4,6).
- 15. Legacy packet switch connectivity option(5,5).
- 16. Packet used to establish adjacency to other OSPF routers.
- 17. This cyber attack occurs when threat actors have positioned themselves between a source and destination.
Down
- 1. Type of ACL that permits or denies packets based only on the source IPv4 address.
- 2. Features of this WAN topology are redundancy, load balancing and distributed computing. Is more expensive(4,5).
- 3. Non-secure site-to-site VPN.
- 7. VPN connection that uses SSL.
- 8. Each level in a NTP hierarchy is called this.
- 9. In this OSPF operational state, communication between the two routers is bidirectional(3,3).
- 10. Broadband technology that uses coaxial cable as a medium to provide IP services to users.
- 12. Queuing method that buffers and forwards packets in the order of their arrival.
- 13. Type of NAT that uses a one-to-one mapping of local and global addresses.
- 14. Level 7 of the syslog severity scale.
