Across
- 5. Processor, memory, hard-disk or other storage subsystem, and wired/wireless utilization.
- 6. contain events triggered by applications or programs determined by their programmers
- 10. Supports plaintext authentication with MD5 or SHA with no encryption but provides GET BULK.
- 13. the facility to which the message refers.
- 15. a device that test the speed of data transfer in the network.
- 19. are used to determine whether your network meets specific International Organization for Standardization or Telecommunication Industry Association standards.
- 21. detects unwanted attempts to manipulate network systems and/or environments
- 22. a single digit code from 0 to 7 that indicates the severity of the message.
- 24. most popular form of TCP scanning
- 26. displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
- 27. is a device that transmits signals through each wire copper twisted pair to determine if it is connected to the correct pin at the other end.
- 28. used for sniffing wireless networks
- 29. protocol analyzers such as load testing, connectivity testing, and throughput testing.
- 32. contain events generated by Windows system component, including drivers and services that started or failed to start.
- 33. the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
- 35. analyzes protocols
- 36. looks inside every packet on a network segment.
Down
- 1. text string containing detailed information about the even being reported.
- 2. the standard level of performance of a certain device or to the normal operating capacity for your whole network.
- 3. date and time of a message.
- 4. a text string that uniquely describes the message.
- 7. a diagnostic procedure in which a signal is transmitted and returned to the sending device after passing through all or a portion of a network circuit.
- 8. a powerful enterprise (large corporate environment) network intrusion and prevention system.
- 9. a device that test the speed of data transfer in the network.
- 10. contain security events like valid logon attempts and potential security problems
- 11. a term for software products and services combining security information management and security event management.
- 12. is a line tester designed to check a copper cable connection for basic installation problems like opens, shorts, and crossed pairs.
- 14. stores messages from you and can even time stamp and sequence them for you. Allows you to display, sort, and even search messages.
- 16. sends messages to the NMS station, which then either reads or writes information in the database, stored on the NMS.
- 17. a software tool designed to search a host for open ports.
- 18. a combination cable tester and network analyzer, only better because it comes with more options.
- 20. is a computer security device that monitors network and/or system activities for any strange or malicious behavior
- 23. scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
- 25. a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
- 30. Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers.
- 31. supports plaintext authentication with community strings and uses only UDP.
- 34. an Application layer protocol that provides a message format for agents on a variety of devices to communicate with network management stations.
