Across |
3. | A tunneling protocol in which IPv6 packets travel over an IPv4 network. Named after the Teredo worm that bores holes in wood. (2 Words) |
8. | A unique, text-based name that identifies a network |
10. | A distributed pool of information that keeps track of assigned host names and domain names and their corresponding IP addresses, and the system that allows a host to locate information in the pool. (2 Words) |
11. | protocol that includes data encryption for security using the SSL or TLS security protocols. |
13. | A private network that uses the TCP/IP protocols. |
14. | A license leased for a range of IP addresses that defines a single octet, which is the network portion of the IP addresses in that license (2 Words) |
15. | The protocol used by the Windows Remote Desktop and Remote Assistance utilities to connect to and control a remote computer. |
17. | A 48-bit hardware address unique to each NIC card or onboard network controller and assigned by the manufacturer at the factory |
18. | a local area network or wide area network bounded by routers. |
19. | a computer on a network will use to access another network unless it knows to specifically use another gateway for quicker access to that network. (2 Words) |
21. | A name that identifies a computer, printer, or other device on a network, which can be used instead of the computer’s IP address to address the computer on the network |
23. | When several local networks are tied together in a subsystem of the larger intranet. |
24. | A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the Internet. |
26. | Segment of network data that also includes header, destination address, and type of data that is sent as a unit |
27. | A protocol used to transfer files from an FTP server to an FTP client using encryption. |