negede gizaw

12345678910111213141516171819202122
Across
  1. 2. Which element of a security policy describes how users identify themselves to gain access to network resources?
  2. 4. creates a barrier between networks so that potentially
  3. 7. only backs up files that have changed since the last full backup
  4. 13. is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
  5. 14. Protocol version a mutual authentication protocol
  6. 15. packets can’t enter or leave the protected networks
  7. 16. backs up any files that have changed since the last full or incremental backup
  8. 19. most incoming packets that have been requested
  9. 20. prevents people from using eavesdropping technology
  10. 22. used in a Windows domain environment and provides mutual
Down
  1. 1. creates a barrier between a computer OS and the network
  2. 3. creates a barrier between two entities
  3. 5. used by OSs and network devices offer varying levels of secure authentication
  4. 6. Extensible Authentication Protocol a framework for other protocols
  5. 8. attackers who do not report problems,
  6. 9. all of the disk’s contents are backed up as individual folders and files
  7. 10. a framework for other protocols
  8. 11. backs up the disk sector by sector to create an exact image of the disk’s contents
  9. 12. an industry standard client server protocol that offers centralized control
  10. 17. provide encryption and authentication
  11. 18. Password Authentication Protocol
  12. 21. come with a built-in host firewall that is preconfigured to