Across
- 1. is the implementation name for wireless security that adheres to the 802.11i specifications. It was introduced in 2004 and is still heavily used in today's networks.
- 4. Responsible for monitoring and controlling all incoming and outgoing traffic. The firewall controls the flow of data based on rules that have been configured by the network administrator.
- 6. Wireless local area network covers an area that is roughly the same size as a standard LAN. It uses radio signals to connect systems instead of wires.
- 7. Stores plaintext notes in a DNS zone. This record type can be used to help prevent email spam and verify domain ownership.
- 9. Introduced in 2018 to address the vulnerabilities inherent in the WPA2 handshake and to support newer technologies. Instead of using the pre-shared key, It implements the Simultaneous Authentication of Equals (SAE) standard.
- 11. uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- 12. A networking device that connects internal hosts using Ethernet cables. When data comes in, the switch forwards it to the intended recipient.
- 15. The variation in the latency of VoIP packets.
- 17. a newer technology that is built on RFID. allows two-way communication between two devices that are within 2 inches of each other.
- 19. Wide area network - a group of LANs that are geographically isolated, but are connected to form a large internetwork.
- 20. Utility used to view or modify current IP configuration in Windows.
- 24. A connectionless protocol. Instead of verifying that each packet sent is received, UDP sends the packets one at time and the receiver processes them as they come in.
- 25. a network with geographically dispersed WAN connections that connect multiple LANs.
- 26. Utility used to view or modify current DNS configuration in Windows.
- 27. Windows utility used to check the health of a hard drive.
- 29. _____address. A 48-bit physical address that is a unique identifier for all network adapters.
- 30. a private network that uses internet technologies.
- 32. Utility used to view or modify the device name.
Down
- 1. Wireless wide area network - covers a large geographical area by connecting separate areas wirelessly. WLAN and WWAN both connect to the internet wirelessly, but they use different technologies to do it.
- 2. Local area network -a network in a small geographic area, like an office. A LAN typically uses wires to connect systems together.
- 3. Wireless communication technology that allows two devices to connect to each other over a short distance.
- 5. a private network that uses internet technologies and makes its resources are made available to external trusted users.
- 8. Radio Frequency Identification - A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- 10. Utility used to test the connection between two devices.
- 13. Wireless Access Point - A networking device that provides connection to a wireless network.
- 14. The amount of time it takes to send a network request and receive a response back.
- 16. A networking device that connects two networks together.
- 18. Campus area network -sometimes referred to as a corporate area network, is established when multiple LANs are connected within a limited area.
- 19. Wireless mesh network - a group of wireless mesh nodes that communicate with one another to share the network connection across a large area.
- 20. A 32-bit logical address that consists of four decimal numbers separated by a dot that can range from 0 to 255 (ex. 192.168.1.50).
- 21. This is the name of specific hosts on the network.
- 22. is a large, world-wide, public network. The network is public because virtually anyone can connect to it.
- 23. A networking device that connects internal hosts using Ethernet cables. When data comes in, the hub forwards it to all connected devices.
- 28. Utility used to view or modify current DNS configuration in Linux.
- 29. Metropolitan area network - is a network that covers an area as small as a few city blocks to as large as an entire metropolitan city. MANs are typically owned and managed by a city as a public utility.
- 31. records are very important in the zone transfer process.
- 33. A connection-oriented protocol. This means that when data is sent between two hosts, the TCP protocol ensures that every packet sent is received before sending the next packet.
