Across
- 1. A networking feature that enhances the reliability and security of a Spanning Tree Protocol (STP) topology by protecting against unauthorized devices
- 3. Limiting access on switch ports.
- 5. It is a crucial component of both the public and private keys in RSA encryption and decryption processes.
- 8. A network protocol primarily used for centralized management of user access to network devices
- 10. ___________ data guard detects misconfigured fiber or switch connections
- 12. Securing trunk links between switches by only permitting specific vlans.
- 13. Enabling PortFast for secure switch operation.
- 14. Designated ports for DHCP Snooping.
Down
- 2. Preventing rogue DHCP servers (shortened form).
- 4. A network protocol that handles authentication, authorization, and accounting (AAA) for users and devices accessing a network
- 6. Filtering based on MAC addresses.
- 7. Dividing network into secure VLANs.
- 9. Using SSH for secure management.
- 11. Port security feature that retains learned MAC addresses on a switch port, even after the switch restarts or the link goes down
- 12. Securing ARP traffic with DHCP Snooping.
