Amazing

12345678910111213141516171819
Across
  1. 3. is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
  2. 4. The most widely used method for encrypting data is IP
  3. 6. common tool used by many Linux administrators is iptables
  4. 7. what the user has (smart card or key)
  5. 9. used in a Windows domain environment and provides mutual authentication
  6. 11. creates a barrier between a computer OS and the network sopotentially harmful packets can’t enter or leave the OS
  7. 13. Generally, the rule for sizing the page file is to set the initial size to 1.5 times the amount of
  8. 14. Password policies for a single Windows computer can be set in the Local
  9. 16. automatically cleans out many temporary, log, and other files on a regular basis
  10. 18. certificates involve a certification authority (CA)
  11. 19. Use the Disk Cleanup tool to delete unneeded files in
Down
  1. 1. Use a combination of uppercase letters, lowercase letters, numbers, and
  2. 2. Users can be restricted to logging on only from particular
  3. 5. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  4. 6. backup backs the disk sector by sector to create an of the disk’s contents
  5. 8. creates a barrier between two entities
  6. 10. Use the Windows Defender Firewall app to allow a particular application
  7. 12. Linux and macOS have update components built into the
  8. 15. should specify that sensitive or valuable data should only be stored
  9. 17. minimum of five to eight characters is typical