Network Infrastructure & Technologies

1234567891011121314
Across
  1. 1. An emulation of a computer system that provides the functionality of a physical computer.
  2. 7. The on-demand delivery of IT resources over the internet with pay-as-you-go pricing.
  3. 11. An Intermediary server that separates end users from the websites they browse, often used to hide internal IP addresses.
  4. 12. A system that monitors network traffic for suspicious activity and issues alerts, but does not move to block it automatically.
  5. 14. The software that supports a computer's basic functions, such as scheduling tasks and executing applications.
Down
  1. 1. The process of creating a software-based representation of something, such as virtual applications, servers, or networks.
  2. 2. An open-source Operating System frequently used in cybersecurity for penetration testing and server management.
  3. 3. Any physical device within a network of other devices that’s able to send, receive, or forward information (e.g., a computer or router).
  4. 4. A global network of servers acting as a single ecosystem, commonly used for storage or computing power.
  5. 5. A decoy system or network trap designed to lure in potential attackers to study their methods.
  6. 6. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  7. 8. A network security tool that monitors a network for malicious activity and takes active steps to block or prevent it.
  8. 9. Software, firmware, or hardware that creates and runs Virtual Machines.
  9. 10. The physical path or transmission material used to carry data signals across a network (e.g., fiber optic, copper wire, or radio waves).
  10. 13. A physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually the internet.