Across
- 2. Network is able to perform required functions without failing
- 5. Distributing network traffic across many servers to optimize resource use and avoid overload
- 7. Network is able to handle an increase in the number of users
- 8. The physical or logical arrangement of network devices and connections.
- 12. Policies that restrict network access to authorized users often involving authentication
- 16. Rules set in place to protect network from attacks
- 17. Additional pathways that ensure network availability in case of a failure
- 19. Security devices that monitor and control incoming or outgoing network traffic based on security rules
- 20. The process of converting data into a coded format to prevent unauthorized access
Down
- 1. Techniques used to control network bandwidth to ensure optimal performance
- 3. Measurement of a network(in Mbps or Gbps)
- 4. Tools used to control network traffic for suspicious activity and take action to prevent or mitigate attacks
- 6. The aberration in packet arrival times
- 9. Making sure the network meets industry standards related to data handling and privacy
- 10. Dividing a network into smaller segments to improve performance and security
- 11. A delay in signals being received or sent. Crucial for gaming and video conferences
- 13. Manners used to categorizing certain types of traffic to ensure performance of applications
- 14. Creating virtual versions of network resources such as servers or switches to optimize flexibility
- 15. Different systems and devices working together within a network ensuring a seamless communication
- 18. The rate of successful data transfer across a network
