Chapter 7 Crossword

1234567891011121314151617181920
Across
  1. 4. Contains servers that should be acdcessibile from the Internet.
  2. 7. A network appliance dedicated to the purpose of acting like a firewall.
  3. 9. Rules typically applied to router interfaces, which specify permitted and denied traffic.
  4. 12. A network containing more than one honey pot.
  5. 15. Can support secure communications between two sites over an untrusted network.
  6. 18. A system designed to be very appealing to hackers, when in fact it is a trap to catch them.
  7. 19. An Intrusion _______ System resides in-line with traffic flow and can recognize the signature of a well-known attack and respond.
  8. 20. A TCP-based protocol that encrypts an entire authentication packet.
Down
  1. 1. An Intrusion _______ System does not reside in-line traffic flow and thus one or more malicious packets might reach an intended victim before traffic flow is stopped.
  2. 2. A type of firewall that not only examines packets but also knows the context within which the packet was sent.
  3. 3. A client-server authentication protocol that supports mutual authentication between client and server.
  4. 5. A UDP-based protocol that does not ecrypt the entire authentication packet, but only the password.
  5. 6. A device or software that provides a barrier between your machine or network and the rest of the world.
  6. 8. An attack that is launched from multimple locations that denies service.
  7. 10. A computer running firewall software.
  8. 11. Encryption method where both the sender and receiver of a packet use a shared key for encryption and decryption.
  9. 13. An attack that uses the FTP PORT command to covertly open a connetion with a remote system.
  10. 14. A type of firewall that inspects traffic leaving the inside network as it goes out to the Internet.
  11. 16. Internet Protocol Security, a method to secure VPN's
  12. 17. Encryption method where the sender and receiver of a packet use different keys.