Across
- 5. A source or destination device, can be a computer, printer, phone, and more.
- 8. Is an area network, it usually uses cables to form a network within one limited area.
- 11. This command sets an encrypted password for the privileged exec mode.
- 13. A command that returns the user one configuration mode back in the configuration mode hierarchy.
- 15. A command that creates a message of the day, can be used to declare something on a device such as, "Unauthorized Access is Prohibited".
- 16. A private network of a company but, it can be accessed by authorized users such as customers, suppliers, or collaborators.
- 17. Dynamically assigns ipv4 or ipv6 addressing information to dhcpv4/v6 clients at start-up.
- 18. A command that returns the user to the privileged exec mode from any sub configuration mode.
- 21. Finds the best path for a packet from one router to another.
- 22. A specific organization or entity can use this to store and access data, can be expensive.
- 24. Allows a user to navigate through a system using icons, menus, and windows. It is not always stable and can fail.
- 25. Provides an insecure in-band cli connection, does not have any encryption.
- 27. Data Link layer PDU
- 28. Prioritizes traffic which allows for more important traffic to go first, such as video.
- 30. As data is sent down to other layers, those layers encapsulate that data then add a header and sometimes a trailer.
- 32. Provides an in-band remote cli connection with strong encryption.
- 34. It is an easily expandable network, it doesn't affect the functionality of the network while expanding it.
- 35. A command mode that uses the # as its prompt ending, allows users to enter global configuration mode, and can execute configuration commands.
Down
- 1. Allows users to use their own device to access information.
- 2. Is a stable and low resource intensive way of interacting with a system.
- 3. A private network for a specific organization or company. Only those in the company are allowed to use it.
- 4. Network layer PDU
- 6. A command mode that uses the > as its prompt ending and has limited basic monitoring commands.
- 7. Allows users to access and maintain emails on a mail server.
- 9. A command mode that can go into sub configuration modes and commands inputted affect the running-configuration of a device.
- 10. Transport layer PDU
- 12. Data is de-encapsulated as it is sent up to other layers, it also removes protocol headers as it goes through the process.
- 14. Connectionless communication protocol
- 19. A file transport protocol, it is connectionless, uses best-effort, and has unacknowledged file delivery.
- 20. A command that shows a list of possible commands that could be used at the current configuration mode and a list of what commands could be used that follow the input in the command line. Uses the symbol ?
- 23. Connects end devices, most often are routers, switches, or firewalls.
- 26. Operates at the network layer for Cisco, shows dynamic address mapping for an ipv4 address to a hardware address.
- 29. An area network that is able to connect companies over a large distance, even to different countries.
- 31. The smallest office space, can also be in homes.
- 33. Anyone can use this to access or store data, open for anyone to use.
