Across
- 2. :A program to stop virus attack.
- 5. :Deny or allow packet based on rules.
- 6. :Blocks Unauthorised access to networks.
- 11. :A powerful machine which answers.
- 12. : An attack which slows down or crashes equipment and programs
- 13. :interconnects networks
- 14. :Stealing your username and password.
- 17. :Marks IP address in network diagram
- 18. :A machine which asks or start communication.
- 20. :All devices can talk to each other.
- 23. : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- 25. Program secretly collecting information.
Down
- 1. :An attack named after greek-trojan war.
- 3. :Access to people inside company only.
- 4. :Network Can grow
- 7. :Network attack that occurs on the first day that a vulnerability becomes known.
- 8. :Business and Personal equipment must be protected
- 9. :WANs are in control of _______________.
- 10. :A known person trying to access you system.
- 15. :__________Signals are used to carry message in fibre optic cables
- 16. :A Method to connect Business to Internet
- 17. :interconnect end devices in a limited area such as a home, school, office building, or campus.
- 19. :Address space for IoT
- 21. :Priority Queues
- 22. :command to go from switch> to switch#
- 24. :Creates a secure connection for remote workers.
