Final Review

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
Across
  1. 2. Contains users and computer settings and policies.
  2. 4. This configuration change allows admins to improve VoIP.
  3. 6. The amount of time that the data can be stored in the DNS cache.
  4. 8. This technology is also referred to as a PAN.
  5. 11. A group of networks that are geographically isolated but are connected by ISPs.
  6. 13. This email protocol is used to send emails.
  7. 14. Changing this value in Task Manager provides adequate attention from the system CPU to a process.
  8. 16. A secure remote access protocol.
  9. 19. Is used to encrypt the entire volume.
  10. 21. IP address on the 169.254.0.0 network assigned by hosts to themselves.
  11. 22. Public key encryption happens in this OSI model layer.
  12. 24. File Access Protocol which can be protected.
  13. 25. Windows admin utility that allows admins to aggregate different admin tools.
  14. 27. A list that contains information on allowed and denied access to folders and files.
  15. 32. Tis virtualization component provides the hardware needed.
  16. 33. The DNS servers hold the original and official DNS records for a specific domain.
  17. 34. This kernel component moves the data of an app not currently being accessed from RAM to a paging file.
  18. 35. This email Protocol is used to retrieve emails.
  19. 37. In a TCP connection hosts send this packet to establish a connection.
  20. 38. The rights granted to a user or group to access files and folders.
  21. 40. A thin layer of software that resides between the virtual machine and hardware.
  22. 42. This Linux command is used to change permissions.
  23. 44. This attribute is unique for all objects in a domain.
  24. 45. Is responsible for converting logical data into an acceptable form for transmission.
  25. 46. Hubs physical topology.
  26. 47. This OSI model layer is responsible for end-to-end communication.
  27. 48. This command allows you to resolve a hostname to its associated IP address.
  28. 51. A type of system software on SOHO routers.
  29. 53. This type of Windows installation is used when a compatible OS needs to be upgraded.
Down
  1. 1. .com, .net, and .ca are registered under this DNS server.
  2. 3. This topology describes how the network's computers are connected.
  3. 5. TCP protocol sends this to start the handshake negotiation.
  4. 6. A reliable Transport layer protocol.
  5. 7. Is a lightweight Active Directory Protocol.
  6. 9. In this network type, organization resources are shared with suppliers.
  7. 10. A file created by the hypervisor to store data.
  8. 12. The process of proving someone's identity.
  9. 15. This application layer protocol uses TCP port 3389.
  10. 17. Simple Multi-tenancy is associated with this cloud type.
  11. 18. This wireless feature allows a printer connection with the least effort.
  12. 20. Type of network is available privately to employees.
  13. 23. Disabling this option creates unique permissions for a folder.
  14. 26. These types of groups are created mainly for permissions.
  15. 28. This application layer protocol uses TCP port 389.
  16. 29. This cloud solution delivers everything a developer needs.
  17. 30. This backup solution backs up every file that has changed since the last full backup.
  18. 31. This VPN provides both authentication and encryption.
  19. 36. The network name on a wireless network.
  20. 39. The frequency at which your router sends and receives signals.
  21. 41. This reference model is created to interpret network communication.
  22. 43. This command in the Linux system is used to search for text.
  23. 49. Uses TCP port 22 for remote access.
  24. 50. This transport layer protocol is used when speed is the main concern.
  25. 52. This device interconnects multiple networks to each other.