Across
- 4. (4-5,8) is a program that runs on a computer to allow or deny traffic between the computer and other connected computers. It applies a set of rules to data transmissions through inspection and filtering of data packets.
- 5. is hardware or software solutions that enforce network security policies. This can filters unauthorized or potentially dangerous traffic from entering the network.
- 9. (6,5) is a protocol that provides a secure (encrypted) management connection to a remote device.
- 10. (9,9,6) A host intrusion detection system is software that runs on a host computer that monitors suspicious activity.
- 12. This is code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack.
- 13. can provide a way to group devices within a LAN and on individual switches. They use logical connections instead of physical connections.
- 14. (8,5) An administrator should look at every service to verify its necessity and evaluate its risk. Remove any unnecessary services.
Down
- 1. (6,14) also called two-way authentication, is a process or technology in which both entities in a communications link authenticate to each other.
- 2. (2-2,9,6) was the computer industry’s response to the weakness of the previous WEP standard. The WPA2 standard provided several security improvements.
- 3. (4,6) “freezes” the hard drive partition. When a user restarts the system, the system reverts to its frozen configuration. The system does not save any changes that the user makes.
- 6. (5,6) In most networks that use Windows computers, an administrator configures these to ensure groups and setting policy at a group level i.e. access to USB devices
- 7. these form the backbone of the Internet and communications between different networks. They communicate with one another to identify the best possible path to deliver traffic to different networks.
- 8. (7,7,7) A private network that connects remote sites or users together over a public network, like the Internet.
- 11. (4,7) copies the contents of the computer’s hard disk to an image file.
