Betelihem Abeje 12/05/2024

1234567891011121314151617181920
Across
  1. 2. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  2. 5. security features that enable administrators to control who has access to the network
  3. 8. testers who are paid to probe networks and report vulnerabilities
  4. 9. allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
  5. 11. a document that describes the rules governing access to an organization’s information resources
  6. 15. a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
  7. 16. attackers who do not report problems, but instead disseminate the information to other black hat attackers
  8. 18. creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
  9. 19. WSUS is a server role that makes it possible for administrators to take control of Microsoft product updates a process called
  10. 20. only backs up files that have changed since the last full backup
Down
  1. 1. a Windows domain environment and provides mutual authentication
  2. 3. to supply two or more types of authentication drawn from Knowledge, Possession, Inherence
  3. 4. security features that enable what users can do after they are logged on to the network
  4. 6. backs up the disk sector by sector to create an exact image of the disk’s contents
  5. 7. is specially allocated disk area that holds information that is swapped back and forth from RAM to disk
  6. 10. good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
  7. 12. The most widely used method for encrypting data
  8. 13. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  9. 14. common tool used by many Linux administrators
  10. 17. Most Linux distributions have a built-in firewall called