Networking Devices (Quiz 2)

1234567891011121314151617181920212223242526272829
Across
  1. 2. A system designed to both detect and prevent malicious network traffic
  2. 4. A method of tricking individuals into revealing personal information by pretending to be a trusted entity
  3. 6. A technique used to modify network addresses as packets pass through a router
  4. 7. A server that acts as an intermediary between the user and the internet to enhance privacy
  5. 9. A security system designed to block unauthorized access to a network or computer system
  6. 10. Software designed to harm or exploit any device, service, or network
  7. 12. The act of altering the appearance of a website, often as part of a cyber attack
  8. 13. A type of attack where data exceeds a buffer’s limit, potentially allowing code execution (hyphenated two-piece word)
  9. 15. A firewall configuration where only authorized services are exposed to the internet
  10. 16. A system that monitors network traffic for suspicious activity and raises alerts
  11. 20. A detection method that identifies behavior outside of predefined patterns (hyphenated two-piece word)
  12. 21. A type of worm that specifically targeted Microsoft IIS web servers
  13. 22. A buffer zone between a private network and the internet that hosts public-facing services
  14. 25. A security measure that restricts users' access to certain network resources based on their identity (hyphenated two-piece word)
  15. 26. The process of identifying unauthorized access to a network or system (hyphenated two-piece word)
  16. 29. A manipulation technique where attackers exploit human psychology to gain unauthorized access (hyphenated two-piece word)
Down
  1. 1. An IDS that monitors network traffic for unusual patterns
  2. 3. Type of IDS that detects known threats based on predefined patterns (hyphenated two-piece word)
  3. 5. A security architecture that uses two firewalls to protect the internal network (hyphenated two-piece word)
  4. 7. A tool used to capture and analyze network traffic in real-time (hyphenated two-piece word)
  5. 8. Technology that checks the state of active connections before deciding which packets to allow (hyphenated two-piece word)
  6. 11. A firewall designed to protect web applications from security threats by filtering traffic
  7. 14. A type of malicious software that locks a computer or data until a ransom is paid
  8. 17. An attack method used to gain unauthorized access by guessing or cracking passwords (hyphenated two-piece word)
  9. 18. An attack that disrupts the normal functioning of a server or network by overwhelming it with traffic (hyphenated two-piece word)
  10. 19. A server that hosts websites and delivers web pages to users' browsers (hyphenated two-piece word)
  11. 23. The process of converting data into a coded format to prevent unauthorized access, ensuring that only authorized users can decipher it
  12. 24. A secure method for connecting to a network from a remote location
  13. 27. Malicious software that allows hackers to gain administrative access while hiding its presence
  14. 28. A type of IDS that monitors activity on a single host or system