CHAPTER 18 TERMS

123456789101112131415161718192021222324252627282930313233343536
Across
  1. 5. Processor, memory, hard-disk or other storage subsystem, and wired/wireless utilization.
  2. 6. contain events triggered by applications or programs determined by their programmers
  3. 10. Supports plaintext authentication with MD5 or SHA with no encryption but provides GET BULK.
  4. 13. the facility to which the message refers.
  5. 15. a device that test the speed of data transfer in the network.
  6. 19. are used to determine whether your network meets specific International Organization for Standardization or Telecommunication Industry Association standards.
  7. 21. detects unwanted attempts to manipulate network systems and/or environments
  8. 22. a single digit code from 0 to 7 that indicates the severity of the message.
  9. 24. most popular form of TCP scanning
  10. 26. displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
  11. 27. is a device that transmits signals through each wire copper twisted pair to determine if it is connected to the correct pin at the other end.
  12. 28. used for sniffing wireless networks
  13. 29. protocol analyzers such as load testing, connectivity testing, and throughput testing.
  14. 32. contain events generated by Windows system component, including drivers and services that started or failed to start.
  15. 33. the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
  16. 35. analyzes protocols
  17. 36. looks inside every packet on a network segment.
Down
  1. 1. text string containing detailed information about the even being reported.
  2. 2. the standard level of performance of a certain device or to the normal operating capacity for your whole network.
  3. 3. date and time of a message.
  4. 4. a text string that uniquely describes the message.
  5. 7. a diagnostic procedure in which a signal is transmitted and returned to the sending device after passing through all or a portion of a network circuit.
  6. 8. a powerful enterprise (large corporate environment) network intrusion and prevention system.
  7. 9. a device that test the speed of data transfer in the network.
  8. 10. contain security events like valid logon attempts and potential security problems
  9. 11. a term for software products and services combining security information management and security event management.
  10. 12. is a line tester designed to check a copper cable connection for basic installation problems like opens, shorts, and crossed pairs.
  11. 14. stores messages from you and can even time stamp and sequence them for you. Allows you to display, sort, and even search messages.
  12. 16. sends messages to the NMS station, which then either reads or writes information in the database, stored on the NMS.
  13. 17. a software tool designed to search a host for open ports.
  14. 18. a combination cable tester and network analyzer, only better because it comes with more options.
  15. 20. is a computer security device that monitors network and/or system activities for any strange or malicious behavior
  16. 23. scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
  17. 25. a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
  18. 30. Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers.
  19. 31. supports plaintext authentication with community strings and uses only UDP.
  20. 34. an Application layer protocol that provides a message format for agents on a variety of devices to communicate with network management stations.