Per 1 Chapter 11 - Nieves, J

123456789101112131415161718192021222324252627282930
Across
  1. 2. This is used to create customized system image files that will be installed on computers in the enterprise.
  2. 4. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
  3. 7. To display a list of tasks that are unique to the application, right-click the application's icon in the taskbar.
  4. 8. Monitors programs on the computer and warns users when an action might present a threat to the computer.
  5. 11. The command that tests basic connectivity between devices by using ICMP echo request and reply messages.
  6. 12. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
  7. 14. Configure basic internet settings, such as selecting the default home page, viewing and deleting browsing history, adjusting search settings, etc.
  8. 17. A specific monitor can be configured if there is more than one monitor.
  9. 21. This specifies the number of pixels horizontally and vertically. A higher number of pixels provides better resolution.
  10. 24. This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
  11. 26. These users can only make configuration changes that affect their own profile.
  12. 28. This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
  13. 29. The command that is used to query the DNS server to discover IP addresses or host names.
  14. 30. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
Down
  1. 1. To add an application to the taskbar for easy access, right-click the icon of an application and select Pin to taskbar.
  2. 3. Provides very weak security and should not be relied upon for confidentiality.
  3. 5. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
  4. 6. To view a thumbnail image of a running program, hover the mouse over the program icon on the taskbar.
  5. 9. Displays the Group Policy settings that are in effect for a currently logged in user.
  6. 10. These users can access files from other users. They also have elevated permission.
  7. 13. View the desktop icons that are behind open windows by placing your cursor over the Show desktop button found at the right edge of the taskbar.
  8. 15. A group of computers and electronic devices with a common set of rules and procedures administered as a unit.
  9. 16. A private network that connects remote sites or users together over a public network, like the internet.
  10. 18. The command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path.
  11. 19. A feature that enables a user to encrypt all data on a disk drive or removable drive.
  12. 20. A command-line terminal emulation protocol and program that works over port 23.
  13. 22. This sets how often the image in the screen is redrawn.
  14. 23. This determines whether the display appears in Landscape, Portrait, flipped Landscape, or flipped Portrait.
  15. 25. Minimizes all windows that are not being used by clicking and holding the title bar of one window and shaking it with the mouse.
  16. 27. A collection of LAN workstations and servers that are designed to communicate and exchange data with one another