Networking Review

1234567891011121314151617181920212223
Across
  1. 4. server used to authenticate based on user profile database
  2. 8. layer of the OSI model IPsec operates in
  3. 10. programmers develop these to fix any problems after a release
  4. 11. requires private key and public key pairs
  5. 12. relies on tickets to grant access to resources
  6. 13. encapsulating one protocol within another
  7. 15. computer controlled by third party
  8. 18. virus that affects both the boot sector & files
  9. 20. a network where only authorized users have access to the data
  10. 21. attacker simply drives around scanning for networks
  11. 23. standard allows you to create a private network on intranet
Down
  1. 1. actively replicates itself without intervention
  2. 2. uses two databases and TCP to authenticate users
  3. 3. VPN protocol created by Microsoft
  4. 5. acronym for Data Encryption Standard & type of public key encrypt
  5. 6. hacker can use to intercept traffic on your network
  6. 7. attack that prevents users from accessing the system
  7. 9. authentication, authorization and ______
  8. 10. defines the appropriate response to a security event
  9. 11. people try to call or email for personal information
  10. 14. process that encodes and decodes data
  11. 16. type of antivirus scan even with no definition for it
  12. 17. outdated and compromised security mechanism
  13. 19. minimum length of passwords
  14. 21. how often you should update antivirus software
  15. 22. wireless access point installed without your knowledge