Across
- 5. a virtual interface that used to transmit data securely between two endpoints
- 6. provides clients on a network with information stored on a database.
- 9. gives wireless devices a sending and receiving connection point to the network.
- 11. An area of a private network accessible by customers.
- 14. Makes a decision on where to transmit packets based on the address sent to it.
- 15. Allows the exchange of a large amount of business data
- 20. Nodes are connected in a straight line on this topology.
- 21. is another name for a network adapter
- 25. Most efficient topology to set up an Ethernet network
- 29. acts as a go-between, connecting computers on the internal network with those on the external network (the Internet).
- 30. is the setting up of a computer system to attract unauthorised users/intruders
- 32. Connect two dissimilar networks.
- 33. Private network set up by a business to share data and resources.
- 34. most suspectable cable to electronic magnetic interference
- 35. More users can be added to the network without affecting the performance of other nodes.
- 36. requires two of the three authentications before authorization is granted.
- 39. listens on a network to ensure no other nodes are transmitting data and it is safe to transmit data.
- 40. is the set of rules governing the format of data sent via the internet or local network
Down
- 1. An arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
- 2. used to host websites to ensure it is accessible via the internet.
- 3. trying to access a system by entering multiple passcodes.
- 4. A bus network contains a single line of communication which has a limitation.
- 7. stores all data on a single server.
- 8. passwords and email addresses is one way to ensure the user accessing the system is legitimate.
- 10. involves having an external screening router examining incoming data packets to ensure that they originated from or are authorized by valid users on the internal network.
- 12. Each network adapter address is represented by this format 01:40:87:44:79:A5
- 13. is a special-purpose computer on a network specifically designed and configured to withstand attack
- 16. is a device that absorbs a signal so that it’s not reflected back onto parts of the network that have already received
- 17. physical or logical arrangement of computers, transmission media (cables), and other network components.
- 18. Security risk of incorrect data entered by us that affects the functioning of a network.
- 19. set of rules that govern how communication is done on a network.
- 22. perform the traffic directing functions on the Internet.
- 23. uses human features to determine whether a user is to be granted permission to the system
- 24. is a standard that defines how to establish and maintain a network conversation by which applications can exchange data.
- 26. Process and deliver incoming and outgoing emails
- 27. servers used to handle repetitive tasks.
- 28. Data flows around the circle from device to device in one direction only using a special data packet
- 31. another name for client/server network
- 37. each node participates in the moving of data along the network.
- 38. swipe cards used to access a secure facility.
