computer clues
Across
- 3. is a document that describes the rules governing access to an organization’s
- 5. Password Authentication Protocol
- 7. The most widely used method for encrypting data is IP Security
- 10. backs up any files that have changed since the last full or incremental backup
- 12. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- 13. A common tool used by many Linux administrators
- 14. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- 15. creates a barrier between two entities
- 16. what the user knows (username/password)
- 18. what the user has (smart card or key)
Down
- 1. used in a Windows domain environment and provides mutual authentication
- 2. creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- 4. backs up the disk sector by sector to create an exact image of the disk’s contents
- 6. is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- 8. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- 9. requires a user to supply two or more types of authentication
- 10. what the user is; a unique biometric identifying trait(fingerprint,retina scan, or voice pattern)
- 11. a framework for other protocols that provide encryption and authentication
- 12. involve a certification authority (CA)
- 17. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets