Crossword 3

12345678910111213141516171819
Across
  1. 2. Properly configured firewalls prevent users from accessing resources that are not _________ for business activities
  2. 3. Server _______ is a technique to assess what services should be running on a server and turn off any unnecessary services
  3. 6. Users will always let you know if they are ______ to access something they need on the network
  4. 9. A buffer between two networks containing servers or resources that must be available to the Internet with a different level of security from other internal systems
  5. 12. ________ provides the ability for internal computers to use a single external IP address for communication on the Internet
  6. 13. A command line tool that utilizes the echo-request and echo-reply to provide a tool for testing connectivity on a network
  7. 14. Ports 135-139 and 445 are used in Microsoft networks for the browsing and _________ of files
  8. 16. The firewall policy should be available for internal ______ to review
  9. 17. The ________ policy is a high-level document describing acceptable incoming and outgoing network traffic and requires very little understanding of technology to understand.
  10. 19. A method of file sharing among computers. (Kazaa, Napster, etc)
Down
  1. 1. A technology whereby users are notified when their friends are online and available to chat
  2. 4. This tool can be used to determine the ip address of websites
  3. 5. A common terminal based application used to gain access to servers and network equipment
  4. 6. ___________ often adopts a more open firewall strategy
  5. 7. An attack where a large volume of network requests are generated, also called a DOS attack.
  6. 8. By talking with knowledgeable employees, hackers often use _______ engineering to bypass firewalls
  7. 10. One of the hardest parts of setting up a firewall policy is determining what services _________ will be able to access
  8. 11. DNS uses port 53 TCP connections for ___________ which may not need to pass through the firewall
  9. 15. The corporate _____ server should be allowed to make outgoing port 25 SMTP connections
  10. 18. The 2 key functions of a firewall are to protect the internet network from attack and controlling access of internal machines to the _________