A+
Across
- 2. A type of software designed to steal personal data.
- 5. A Microsoft cloud storage service.
- 6. A protocol used for remote desktop access.
- 8. A method used to prevent unauthorized access by requiring two credentials.
- 11. Background processes.
- 13. A Windows recovery option for rolling back changes.
- 16. A type of social engineering where an attacker impersonates someone trusted.
- 17. A feature that allows users to run older programs on new Windows versions.
Down
- 1. A Windows security tool that helps prevent malware infections.
- 3. A virtualization platform for running multiple OS.
- 4. A type of virus that hides within legitimate software.
- 7. A type of cyberattack that floods a system with traffic.
- 9. A type of attack that intercepts and alters communication.
- 10. A method of verifying system integrity using cryptography.
- 12. A Windows feature that encrypts individual files and folders.
- 14. A security policy that enforces password changes.
- 15. A type of malware that locks users out of their system.
- 18. A command used to trace network routes.