1 | 15 | 19 | ||||||||||||||||||||||
2 | ||||||||||||||||||||||||
3 | ||||||||||||||||||||||||
4 | ||||||||||||||||||||||||
16 | ||||||||||||||||||||||||
5 | ||||||||||||||||||||||||
6 | ||||||||||||||||||||||||
7 | ||||||||||||||||||||||||
14 | 17 | 18 | ||||||||||||||||||||||
8 | ||||||||||||||||||||||||
9 | ||||||||||||||||||||||||
10 | ||||||||||||||||||||||||
11 | ||||||||||||||||||||||||
12 | ||||||||||||||||||||||||
13 | ||||||||||||||||||||||||
1. The process of invalidating a digital certificate before its expiration date.
2. Wide Area Network – a computer network that covers a large geographical area, typically spanning multiple locations and using public or private communication links.
3. a wireless networking technology that allows devices to connect to the internet via a router
4. The ability of a network to easily accommodate an increasing number of users, devices, or data traffic without a significant decrease in performance.
5. A label is designated to a device that is linked to a computer network.
6. A three-digit number is included in an HTTP response, serving as an indication of the status of the requested resource or the result of the requested action.
7. To copy or transfer data from a remote computer or server to a local device.
8. A device or software component that enables a computer to connect to a network.
9. The process of selecting the best path for data packets to travel from source to destination in a network.
10. The bottommost layer in the TCP/IP network stack responsible for physical transfer of bit streams.
11. An organization or company that manages the reservation and registration of domain names for individuals or businesses.
12. Cryptographic protocols designed to provide secure communication over a computer network.
13. An IP address that is reserved for internal use within a private network.
14. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.
15. Software applications that allow users to send, receive, and manage their email messages.
16. Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.
17. The process of validating and adding new transactions to a blockchain. Miners use specialized hardware to solve complex mathematical problems.
18. The higher-level domain from which the subdomain is created. It is often the main or primary domain.
19. The rate at which data can be transferred between devices on a network.