Across
- 2. Properly configured firewalls prevent users from accessing resources that are not _________ for business activities
- 3. Server _______ is a technique to assess what services should be running on a server and turn off any unnecessary services
- 6. Users will always let you know if they are ______ to access something they need on the network
- 9. A buffer between two networks containing servers or resources that must be available to the Internet with a different level of security from other internal systems
- 12. ________ provides the ability for internal computers to use a single external IP address for communication on the Internet
- 13. A command line tool that utilizes the echo-request and echo-reply to provide a tool for testing connectivity on a network
- 14. Ports 135-139 and 445 are used in Microsoft networks for the browsing and _________ of files
- 16. The firewall policy should be available for internal ______ to review
- 17. The ________ policy is a high-level document describing acceptable incoming and outgoing network traffic and requires very little understanding of technology to understand.
- 19. A method of file sharing among computers. (Kazaa, Napster, etc)
Down
- 1. A technology whereby users are notified when their friends are online and available to chat
- 4. This tool can be used to determine the ip address of websites
- 5. A common terminal based application used to gain access to servers and network equipment
- 6. ___________ often adopts a more open firewall strategy
- 7. An attack where a large volume of network requests are generated, also called a DOS attack.
- 8. By talking with knowledgeable employees, hackers often use _______ engineering to bypass firewalls
- 10. One of the hardest parts of setting up a firewall policy is determining what services _________ will be able to access
- 11. DNS uses port 53 TCP connections for ___________ which may not need to pass through the firewall
- 15. The corporate _____ server should be allowed to make outgoing port 25 SMTP connections
- 18. The 2 key functions of a firewall are to protect the internet network from attack and controlling access of internal machines to the _________
