Per 1 Chapter 11 - Aragon, A

1234567891011121314151617181920212223242526272829303132
Across
  1. 3. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
  2. 6. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
  3. 7. opens the Remote Desktop utility
  4. 10. This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
  5. 12. displays the DNS resolver cache, which contains host and domain names that have been recently queried
  6. 13. This is used to update a local machine and verify that the machine is getting Group Policy updates.
  7. 15. This is used to create customized system image files that will be installed on computers in the enterprise.
  8. 16. Provides storage locations for files and medias
  9. 17. releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
  10. 19. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
  11. 21. These are identified with a dollar sign ($) at the end of the share name.
  12. 23. a dynamic disk that has been moved to a computer from another computer running Windows
  13. 24. Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).
  14. 28. the command that is used to query the DNS server to discover IP addresses or host names
  15. 30. uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
  16. 32. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
Down
  1. 1. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
  2. 2. displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name
  3. 4. Access to files that require higher user privilege
  4. 5. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
  5. 8. These are addresses from a reserved range in the 169.254.x.y network space
  6. 9. forces a DHCP client to renew its DHCP address lease from the DHCP server
  7. 11. contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
  8. 13. displays the Group Policy settings that are in effect for a currently logged in user
  9. 14. A feature that enables a user to encrypt all data on a disk drive or removable drive
  10. 15. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
  11. 18. a basic disk that is being converted into a dynamic disk
  12. 20. Cache - Allows remote computers to share access to a single cache of data from shared folders and files
  13. 22. shows a menu in which you can access applications and power options
  14. 24. provides very weak security and should not be relied upon for confidentiality
  15. 25. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
  16. 26. a private network that connects remote sites or users together over a public network, like the internet
  17. 27. a command-line terminal emulation protocol and program that works over port 23
  18. 29. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
  19. 31. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.