Unit 3: Securing a LAN

1234567891011121314
Across
  1. 1. Switch feature that limits MAC addresses per port.
  2. 3. Type of control that mitigates damage after an incident.
  3. 4. Principle of limiting access to only what's necessary.
  4. 7. Technique where a device impersonates another by changing its MAC address.
  5. 9. Type of firewall that tracks active connections.
  6. 12. CIA Triad principle that restricts data access to authorized users.
  7. 13. A MAC address is also known as a ____ address
  8. 14. Type control that identify when a security breach has occurred.
Down
  1. 2. Type of firewall that only follows static rules
  2. 5. CIA Triad principle that ensures data is accurate and unaltered.
  3. 6. Security controls involving hardware/software like firewalls.
  4. 8. A device or software that filters network traffic based on rules.
  5. 10. Logical segmentation of a network to improve security and performance.
  6. 11. CIA Triad principle ensuring data is accessible when needed.