Per 1 Chapter 11 - Aragon, A
Across
- 3. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
- 6. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
- 7. opens the Remote Desktop utility
- 10. This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
- 12. displays the DNS resolver cache, which contains host and domain names that have been recently queried
- 13. This is used to update a local machine and verify that the machine is getting Group Policy updates.
- 15. This is used to create customized system image files that will be installed on computers in the enterprise.
- 16. Provides storage locations for files and medias
- 17. releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
- 19. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
- 21. These are identified with a dollar sign ($) at the end of the share name.
- 23. a dynamic disk that has been moved to a computer from another computer running Windows
- 24. Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).
- 28. the command that is used to query the DNS server to discover IP addresses or host names
- 30. uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
- 32. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
Down
- 1. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
- 2. displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name
- 4. Access to files that require higher user privilege
- 5. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
- 8. These are addresses from a reserved range in the 169.254.x.y network space
- 9. forces a DHCP client to renew its DHCP address lease from the DHCP server
- 11. contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
- 13. displays the Group Policy settings that are in effect for a currently logged in user
- 14. A feature that enables a user to encrypt all data on a disk drive or removable drive
- 15. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
- 18. a basic disk that is being converted into a dynamic disk
- 20. Cache - Allows remote computers to share access to a single cache of data from shared folders and files
- 22. shows a menu in which you can access applications and power options
- 24. provides very weak security and should not be relied upon for confidentiality
- 25. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
- 26. a private network that connects remote sites or users together over a public network, like the internet
- 27. a command-line terminal emulation protocol and program that works over port 23
- 29. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
- 31. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.