Group-6_CPE173P_Crossword

1234567891011121314151617181920
Across
  1. 5. Are devices that operate at the OSI network layer (Layer 3).
  2. 6. Layer aggregates traffic and provides connectivity to services.
  3. 7. a network security device that monitors and filters incoming and outgoing network traffic.
  4. 9. Operating system that was created in 1991.
  5. 13. Process of adding protocol information to data as it moves down the protocol stack.
  6. 15. Also known as script kiddies.
  7. 18. Type of tool is used by a Linux administrator to attack a computer.
  8. 20. Hackers who protest against a variety of political and social ideas.
Down
  1. 1. A one-to-all message delivery option.
  2. 2. A weakness in a system or its design that could be exploited by a threat.
  3. 3. Simple file system supported by many different operating systems.
  4. 4. Term is used to describe a logical drive that can be formatted to store data.
  5. 8. is defined as a networking technology that includes the protocol, port, cable, and computer chip needed to plug a desktop or laptop into a local area network (LAN).
  6. 10. Command that finds the IP address of a server from a URL.
  7. 11. User account that should be used only to perform system management and not for regular use.
  8. 12. Device integrates orchestration tools
  9. 14. A potential danger to an asset such as data or the network itself.
  10. 16. Device that integrates security information and event management into a single platform.
  11. 17. A one-to-one delivery option.
  12. 19. Command that can be used to look for inbound or outbound connections that are not authorized.