Chapter 6 - Network Design Elements

123456789101112131415161718
Across
  1. 3. A cloud-based delivery model for security services like antivirus and firewalls.
  2. 5. A cloud model offering virtualized computing resources over the internet.
  3. 7. A network state where a device defaults to open access after failure.
  4. 10. A solution that enforces security policies before allowing network access.
  5. 13. A method of dialing many phone numbers to find modems or unsecured lines.
  6. 15. Impersonating a device's MAC address to bypass security.
  7. 17. An attack that allows access to traffic on other VLANs.
  8. 18. A network design using two firewalls to isolate a DMZ.
Down
  1. 1. A publicly shared list of known cybersecurity vulnerabilities and exposures.
  2. 2. A cloud model providing a platform for developers to build and deploy applications.
  3. 3. A protocol that prevents network loops by managing redundant paths.
  4. 4. A switch memory table that stores MAC-to-port mappings.
  5. 6. A cloud model where applications are delivered over the internet.
  6. 8. An attack that overwhelms a switch's memory with fake MAC addresses.
  7. 9. A one-to-one mapping between a private and public IP address.
  8. 11. A firewall setup with three interfaces: internal, external, and DMZ.
  9. 12. A method that modifies IP addresses to allow private devices to access the internet.
  10. 14. A buffer zone between internal networks and external, untrusted networks.
  11. 16. A type of NAT that maps multiple private IPs to one public IP using port numbers.