Tough
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
ACROSS

25 Save the entire state of a virtual machine to files [13]
28 __________ system consists of computers that are not only connected but coordinate among each other to form a single system [11]
27 ___________ database, a tabular database in which data is defined so that it can be reorganized and accessed in a number of different ways [10]
26 [M] stands for ___________ in DBMS [10]
8 [N] stands for _______ SNMP [7]
6 [D] stands for ______ in DHCP [7]
4 features of ______ switches include SNMP monitoring, link aggregation, and QoS support [7]
21 [S] stands for ________ in NAS [7]
11 a type of scam where an intruder attempts to gain unauthorized access to a user system or information by pretending to be the user [8]
29 [Q]stands for _________ in SQL [5]
13 a network which provides access to consolidated, block level data storage [3]
18 a network admin tool that is used to test the reachability and availability of a host in an IP network. [4]
1,2 The prevention of unauthorized use of a resource [13]
16,17 The assurance that data received are exactly as sent by an authorized entity [13]
9 Entropy is a measure of _____ of the state [16]
23 The Internet and all IP networks are fundamentally ________ networks [14]
22 Preserve performance with advanced resource controls [9]
DOWN

3 Network _____ is a method of combining the available resources in a network by splitting up the available bandwidth into channels [14]
20 Network _______ is used to connect and transfer data and information between computers, routers, switches and storage area networks [5]
5 A network protocol that allows a management server to dynamically assign an IP address to the resources in its network. [4]
7 _______ maps the name of a resource to its physical IP address [3]
15 A message logging system that allows for a device to send event notifications in IP networks [6]
24 network management protocol that is used for exchanging information between hosts in a network [4]
19 a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients [3]
12 Huffman coding is a _______ data compression algorithm [8]
10 Run multiple operating systems on one physical machine [12]
14 a barrier between a trusted network and and an untrusted network [8]