IT Essentials Review 1
Across
- 3. Protocol that provides a secure remote connection
- 4. A command that will show you the network addressing for a host
- 7. Provides an encrypted tunnel to pass data across the internet
- 8. The chip set that controls access to Video and Ram
- 12. Type of attack that poses as a legitimate entity
- 14. A PAN uses this connection technology
- 15. Type of malware that tries to induce you to buy something
- 17. A user replaceable laptop component
- 20. The type of printer that can print multipart forms in 1 pass
- 21. The actual topology of the network is the
- 23. Printer that uses specially coated paper
- 24. The closed source mobile OS developed by Apple
Down
- 1. The laser printing step that bonds the toner to the paper
- 2. Automatically assigns IP addresses
- 5. The laptop component that converts DC to AC for the display
- 6. The actual amount of data a network can send
- 9. Bypassing the OS restrictions, usually for a mobile device
- 10. Type of attack that tries to deny legitimate access to a resource/website
- 11. The way the devices connect to the network is the _______ Topology
- 13. Security feature that use physical attributes of the user
- 14. The maximum theoretical amount of data a network can send
- 16. The most common format of power supply
- 18. The topology that has every host connected to every host
- 19. What command would you use to verify that another host is active
- 22. The mobile OS developed by Google