Across
- 5. Converting data into a secure code to prevent unauthorized access during transmission.
- 11. Devices that direct data packets between networks, determining optimal paths for transmission.
- 13. Verifying the identity of users, devices, or systems accessing the network.
- 14. The ability of a network to handle increased traffic and growth without performance degradation.
- 15. The flow of data packets through a network, varying in volume and type.
- 16. The speed, efficiency, and effectiveness of network operations and data transmission.
- 18. The ability of devices to establish and maintain connections within a network.
Down
- 1. The time delay between sending and receiving data across a network, affecting response time.
- 2. Establishes secure connections over public networks, ensuring privacy.
- 3. The underlying framework and components that support network operations.
- 4. Creating virtual instances of resources like servers, networks, or storage for efficient utilization.
- 6. The consistency and stability of network operations and services.
- 7. Converting data into a secure code to prevent unauthorized access during transmission.
- 8. Duplication of critical network components to ensure availability in case of failures.
- 9. The capacity of a network to transmit data quickly, often measured in bits per second.
- 10. Security devices that control incoming and outgoing network traffic based on predefined rules.
- 12. Devices that connect devices within a local network and facilitate data exchange.
- 14. Measures to protect network data from unauthorized access, breaches, and cyber threats.
- 17. Continuous observation of network activities and performance for troubleshooting and optimization.
- 19. The amount of data that can be transmitted successfully over a network in a given time.
