IT Essentials Review 1

123456789101112131415161718192021222324
Across
  1. 3. Protocol that provides a secure remote connection
  2. 4. A command that will show you the network addressing for a host
  3. 7. Provides an encrypted tunnel to pass data across the internet
  4. 8. The chip set that controls access to Video and Ram
  5. 12. Type of attack that poses as a legitimate entity
  6. 14. A PAN uses this connection technology
  7. 15. Type of malware that tries to induce you to buy something
  8. 17. A user replaceable laptop component
  9. 20. The type of printer that can print multipart forms in 1 pass
  10. 21. The actual topology of the network is the
  11. 23. Printer that uses specially coated paper
  12. 24. The closed source mobile OS developed by Apple
Down
  1. 1. The laser printing step that bonds the toner to the paper
  2. 2. Automatically assigns IP addresses
  3. 5. The laptop component that converts DC to AC for the display
  4. 6. The actual amount of data a network can send
  5. 9. Bypassing the OS restrictions, usually for a mobile device
  6. 10. Type of attack that tries to deny legitimate access to a resource/website
  7. 11. The way the devices connect to the network is the _______ Topology
  8. 13. Security feature that use physical attributes of the user
  9. 14. The maximum theoretical amount of data a network can send
  10. 16. The most common format of power supply
  11. 18. The topology that has every host connected to every host
  12. 19. What command would you use to verify that another host is active
  13. 22. The mobile OS developed by Google