Chapter 6 Crossword
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
                            
 
 
Down: 1) A device that connects network segments and forwards only frames intended for that specific device or frames sent to all devices2) A device that can direct requests to different servers based on a variety of factors, such as the number of server connections, the server's processor utilization, and overall performance of the server3) Any combination of hardware and software that enables remote users to access a local internal network4) A device designed to be active security; it can detect an attack as it occurs9) A device that can forward packets across computer networks10) A technique that allows private IP addresses to be used on the public Internet11) A technique that uses IP addresses to divide a network into network, subnet, and host13) A technique that examines the current state of a system or network device before it is allowed to connect to the network Across: 5) A separate network that rests outside the secure network perimeter6) A technology that allows scattered users to be logically grouped together even though they may be attached to different switches.7) A technology to use an unsecure public network, such as the Internet, like a secure private network8) A computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user12) A software-based application that runs on a local host computer that can detect an attack as it occurs14) A technology that monitors network traffic to immediately react to block a malicious attack15) A technology that watches for attacks on the network and reports back to a central device
 

 

Create your own Crossword Puzzle for Free!
 Show Errors as I Type