CHAPTER 18 TERMS

123456789101112
Across
  1. 4. detects unwanted attempts to manipulate network systems and/or environments
  2. 6. most popular form of TCP scanning
  3. 7. a device that test the speed of data transfer in the network.
  4. 8. is a computer security device that monitors network and/or system activities for any strange or malicious behavior
  5. 10. used for sniffing wireless networks
  6. 11. scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
  7. 12. a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
Down
  1. 1. a powerful enterprise (large corporate environment) network intrusion and prevention system.
  2. 2. looks inside every packet on a network segment.
  3. 3. the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
  4. 5. displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
  5. 9. a software tool designed to search a host for open ports.