CW1

1234567891011121314151617181920212223242526
Across
  1. 3. Program secretly collecting information.
  2. 6. :A powerful machine which answers.
  3. 7. : An attack which slows down or crashes equipment and programs
  4. 10. :interconnects networks
  5. 11. : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
  6. 14. :Network Can grow
  7. 16. :Deny or allow packet based on rules.
  8. 17. :Stealing your username and password.
  9. 18. :Blocks Unauthorised access to networks.
  10. 19. :Creates a secure connection for remote workers.
  11. 21. :__________Signals are used to carry message in fibre optic cables
  12. 22. :command to go from switch> to switch#
  13. 24. :An attack named after greek-trojan war.
  14. 25. :interconnect end devices in a limited area such as a home, school, office building, or campus.
  15. 26. :Network attack that occurs on the first day that a vulnerability becomes known.
Down
  1. 1. :WANs are in control of _______________.
  2. 2. :Address space for IoT
  3. 4. :A program to stop virus attack.
  4. 5. :Marks IP address in network diagram
  5. 8. :Business and Personal equipment must be protected
  6. 9. :Priority Queues
  7. 12. :Access to people inside company only.
  8. 13. :A Method to connect Business to Internet
  9. 15. :All devices can talk to each other.
  10. 20. :A machine which asks or start communication.
  11. 23. :A known person trying to access you system.