Across
- 4. Use IP Address to pass the data between networks
- 5. Reduce collisions because split the
- 8. is software/hardware based network security system that controls the in and out network traffic
- 11. _____________ Control Protocol
- 12. Downloads onto a computer disguised as a legitimate program
- 15. software intentionally designed to harm a network, server, or computer
- 16. Data arriving to a _____ port is repeated on all the other ports
- 17. Misrepresenting oneself by using fake e- mail addresses or masquerading as someone else
- 18. Intentionally disrupting, defacing or destroying a Web site
- 19. Destroy data when certain conditions are met
- 21. is an object, person, or other entity that represents a constant danger to an asset
- 22. is a flexible filament of very clear glass capable of carrying information in the form of light
- 23. This address is a 48 bits long binary number unique for every network card
- 28. A type of software security
- 32. These IPs do not change. Whether you
- 35. translates the locally significant source address into a globally unique address
- 36. Is a device that plugs into a motherboard and provides ports for the network cable connections
- 37. Doesn’t needs user intervention to replicates
- 38. These losses refer to the loss of trust and lowered opinion of people to a business as a result of them being affected by a threat
- 39. Cable that consists of a cylindrical conductor that surrounds a single inner wire made of two conducting elements
- 40. is a series of LANs linked together to form a network in an extended area
- 41. Type of network that consists of a series of computers linked together to form a network in a circumscribed location
- 42. person who intends to gain unauthorized access to a computer systems
- 43. It forward the information based on MAC address list and ports
- 44. your machine or reboot your router it remains the
Down
- 1. Topology in which all nodes indirectly connect to each other through one or more switches
- 2. A group of computers and associated devices that are connected by communications facilities
- 3. These losses refer to damages of the operating capability of an organisation
- 4. Its purpose is to regenerate signals distorted by transmission loss due to attenuation
- 6. is a network that is spread over a very small area
- 7. domains
- 8. These losses refer to damages to the wealth of an organisation
- 9. Activated when infected program is loaded in memory and executed by its own or a user action
- 10. between computers on a network plural)
- 13. In this topology data travels in one direction using a control signal called a ‘token’
- 14. Fraudulent email leading to a fraudulent website
- 20. Network topology where all the nodes are joined to one cable
- 24. The practice and study of techniques for secure communication
- 25. A type of physical security
- 26. cable type that is commonly used on Ethernet networks
- 27. is a malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
- 29. to a computing device or node when it’s connected to a network
- 30. is a temporary IP address that is
- 31. Is a set of rules that governs the
- 33. occurs when someone steals your personal information to commit crimes in your name
- 34. the process of converting plaintext to ciphertext
