Core 2

123456789101112131415161718
Across
  1. 2. An important identifier for wireless networks
  2. 3. Making a copy of data to prevent data loss in case of hardware failure or other issues
  3. 6. The process of identifying and resolving issues or problems within a computer system or network
  4. 9. Refers to both the physical and logical layout of a network
  5. 12. A type of software that is designed to disrupt, damage, or gain unauthorized access to computer systems
  6. 14. A software program responsible for loading the operating system during the boot process
  7. 15. A technique used to increase data redundancy and protect against data loss in storage systems
  8. 17. A process of converting data into a code to prevent unauthorized access during transmission or storage
  9. 18. This topology gives insights about a network's physical design
Down
  1. 1. A network security system that monitors and controls incoming and outgoing network traffic
  2. 3. A method of securing data by encrypting the entire hard drive
  3. 4. A global network of remote servers
  4. 5. A protocol used for secure remote access to a private network over the internet
  5. 6. A type of malware disguises itself as legitimate software
  6. 7. This virtualization type allows multiple virtual machines to run on a single host OS?
  7. 8. A unique numerical label assigned to each device connected to a computer network
  8. 10. The software that manages and controls computer hardware and software resources
  9. 11. An encryption method uses a single secret key to both encrypt and decrypt data
  10. 13. A protocol currently used for encryption of information being transmitted between wireless routers and wireless devices
  11. 16. A protocol used to dynamically assign IP addresses to devices on a network