Across
- 2. A tool used for scanning and monitoring packets.
- 4. ______________ is the first phase of ethical hacking.
- 5. Packet filtering firewalls work effectively in _________ networks.
Down
- 1. Bug bounty hunters try to find bugs on ________.
- 3. Network enumeration is the finding of __________ or devices on a network.
