Technology Support Engineer

123456789101112131415161718192021222324252627
Across
  1. 4. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  2. 5. Copy of data made to protect against loss or corruption.
  3. 7. Mobile Device Management, used in Intune for managing devices remotely.
  4. 9. Type of malware disguised as legitimate software.
  5. 11. Policy feature in Intune that restricts or allows access to resources based on conditions.
  6. 13. Network utility used to test connectivity between devices.
  7. 14. Secure connection over a public network, often used for remote access.
  8. 15. Firmware used to perform hardware initialization during the booting process.
  9. 18. Software designed to disrupt, damage, or gain unauthorized access to systems.
  10. 20. Windows deployment feature that streamlines device setup and configuration.
  11. 21. System that translates domain names into IP addresses.
  12. 22. Encryption feature that Intune can manage on Windows devices.
  13. 24. Temporary storage area for frequently accessed data.
  14. 26. Volatile memory where data is stored temporarily for quick access.
  15. 27. Device that forwards data packets between computer networks.
Down
  1. 1. Intune feature ensuring devices meet security and configuration standards.
  2. 2. Database in Windows that stores low-level settings for the operating system and applications.
  3. 3. App used by end-users to access corporate resources and apps on Intune-managed devices.
  4. 6. Software update designed to fix bugs or vulnerabilities.
  5. 8. Security system that monitors and controls incoming and outgoing network traffic.
  6. 10. Dedicated instance of services for an organization in Microsoft 365.
  7. 12. Unique address identifying a device on a network.
  8. 16. Protocol used for sending emails.
  9. 17. Software that manages print jobs by storing them temporarily before sending them to the printer.
  10. 19. Small piece of data stored on a user's computer by a web browser.
  11. 20. Software designed to detect and remove malicious programs.
  12. 21. Software that allows an operating system to communicate with hardware devices.
  13. 23. Specific update or patch released to address a particular issue or vulnerability.
  14. 25. Basic networking device that connects multiple devices in a network.