Betelihem Abeje 12/05/2024
Across
- 2. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- 5. security features that enable administrators to control who has access to the network
- 8. testers who are paid to probe networks and report vulnerabilities
- 9. allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
- 11. a document that describes the rules governing access to an organization’s information resources
- 15. a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
- 16. attackers who do not report problems, but instead disseminate the information to other black hat attackers
- 18. creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- 19. WSUS is a server role that makes it possible for administrators to take control of Microsoft product updates a process called
- 20. only backs up files that have changed since the last full backup
Down
- 1. a Windows domain environment and provides mutual authentication
- 3. to supply two or more types of authentication drawn from Knowledge, Possession, Inherence
- 4. security features that enable what users can do after they are logged on to the network
- 6. backs up the disk sector by sector to create an exact image of the disk’s contents
- 7. is specially allocated disk area that holds information that is swapped back and forth from RAM to disk
- 10. good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- 12. The most widely used method for encrypting data
- 13. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- 14. common tool used by many Linux administrators
- 17. Most Linux distributions have a built-in firewall called