Across
- 4. on demand routing protocols are vulnerable to---attack
- 5. Attack in application layer
- 7. false advertiser
- 8. packet replication attack replicates - - - - - packets
- 12. DDoS attack is
- 13. is used to overcome external attack
- 14. FHSS overcomes------attack
Down
- 1. the protocol vulnerable to routing table overflow is
- 2. attacker in a tunnel
- 3. - - - - - happens in impersonation attack
- 6. - - - - occurs due to routing table poisoning
- 7. non optimal route attacker
- 9. man in the - - - - - - is called as MiM
- 10. information disclosure means - - - - of confidential data
- 11. - - - - - attack does not affects the network