Across
- 5. Are devices that operate at the OSI network layer (Layer 3).
- 6. Layer aggregates traffic and provides connectivity to services.
- 7. a network security device that monitors and filters incoming and outgoing network traffic.
- 9. Operating system that was created in 1991.
- 13. Process of adding protocol information to data as it moves down the protocol stack.
- 15. Also known as script kiddies.
- 18. Type of tool is used by a Linux administrator to attack a computer.
- 20. Hackers who protest against a variety of political and social ideas.
Down
- 1. A one-to-all message delivery option.
- 2. A weakness in a system or its design that could be exploited by a threat.
- 3. Simple file system supported by many different operating systems.
- 4. Term is used to describe a logical drive that can be formatted to store data.
- 8. is defined as a networking technology that includes the protocol, port, cable, and computer chip needed to plug a desktop or laptop into a local area network (LAN).
- 10. Command that finds the IP address of a server from a URL.
- 11. User account that should be used only to perform system management and not for regular use.
- 12. Device integrates orchestration tools
- 14. A potential danger to an asset such as data or the network itself.
- 16. Device that integrates security information and event management into a single platform.
- 17. A one-to-one delivery option.
- 19. Command that can be used to look for inbound or outbound connections that are not authorized.
