Amazing
Across
- 3. is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- 4. The most widely used method for encrypting data is IP
- 6. common tool used by many Linux administrators is iptables
- 7. what the user has (smart card or key)
- 9. used in a Windows domain environment and provides mutual authentication
- 11. creates a barrier between a computer OS and the network sopotentially harmful packets can’t enter or leave the OS
- 13. Generally, the rule for sizing the page file is to set the initial size to 1.5 times the amount of
- 14. Password policies for a single Windows computer can be set in the Local
- 16. automatically cleans out many temporary, log, and other files on a regular basis
- 18. certificates involve a certification authority (CA)
- 19. Use the Disk Cleanup tool to delete unneeded files in
Down
- 1. Use a combination of uppercase letters, lowercase letters, numbers, and
- 2. Users can be restricted to logging on only from particular
- 5. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- 6. backup backs the disk sector by sector to create an of the disk’s contents
- 8. creates a barrier between two entities
- 10. Use the Windows Defender Firewall app to allow a particular application
- 12. Linux and macOS have update components built into the
- 15. should specify that sensitive or valuable data should only be stored
- 17. minimum of five to eight characters is typical