Across
- 1. :Blocks Unauthorised access to networks.
- 4. :__________Signals are used to carry message in fibre optic cables
- 5. :Address space for IoT
- 6. : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- 7. :interconnect end devices in a limited area such as a home, school, office building, or campus.
- 8. :A machine which asks or start communication.
- 9. :Deny or allow packet based on rules.
- 10. :All devices can talk to each other.
- 12. :Network attack that occurs on the first
- 14. :An attack named after greek-trojan war.
- 17. :Business and Personal equipment must be protected
- 18. :command to go from switch> to switch#
- 19. :A powerful machine which answers.
- 20. :A Method to connect Business to Internet
- 21. :Creates a secure connection for remote workers.
- 22. that a vulnerability becomes known.
- 23. : An attack which slows down or crashes equipment and programs
Down
- 2. :Marks IP address in network diagram
- 3. :WANs are in control of _______________.
- 5. :Stealing your username and password.
- 6. :Access to people inside company only.
- 11. :Network Can grow
- 13. :Priority Queues
- 15. :interconnects networks
- 16. :A program to stop virus attack.
- 20. Program secretly collecting information.