Across
- 4. spoofing the root bridge and changing the topology of a network
- 7. ARP spoofing and ARP poisoning are mitigated by
- 8. Remote Authentication Dial-In User Service for network security
- 11. ransomware such as WannaCry
- 12. Disable auto trunking on trunk links
- 13. 802.1x
- 16. DHCP server is connected to the network and provides false IP
- 19. provides stateful packet inspection, application visibility and control
- 20. This is a coordinated attack from many devices, called zombies
- 21. Prevents MAC and IP address spoofing
- 22. intermediary between the client and the authentication server
- 24. DHCP starvation attack tool
- 25. can manage access policies across a wide variety of users and device types
- 27. This is a device running 802.1X-compliant client software
Down
- 1. who is permitted to access a network
- 2. hosts are compromised to steal confidential information
- 3. primary framework to set up access control on a network device
- 5. dsniff, Cain & Abel, ettercap, Yersinia
- 6. enables traffic from one VLAN to be seen by another VLAN
- 9. attempt to extract a monetary payment from the victim
- 10. MAC address flooding tool for network vulnerability testing
- 14. what they can do while they are there
- 15. what actions they performed while accessing the network
- 17. mitigation technology for web-based threats
- 18. IP and MAC address spoofing can be mitigated by
- 23. device that is designed to monitor Simple Mail Transfer Protocol (SMTP)
- 26. used by a threat actor to discover network infrastructure vulnerabilities
- 28. Terminal Access Controller Access-Control System for authentication management
