Per 1 Chapter 11 - Nieves, J
Across
- 2. This is used to create customized system image files that will be installed on computers in the enterprise.
- 4. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
- 7. To display a list of tasks that are unique to the application, right-click the application's icon in the taskbar.
- 8. Monitors programs on the computer and warns users when an action might present a threat to the computer.
- 11. The command that tests basic connectivity between devices by using ICMP echo request and reply messages.
- 12. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
- 14. Configure basic internet settings, such as selecting the default home page, viewing and deleting browsing history, adjusting search settings, etc.
- 17. A specific monitor can be configured if there is more than one monitor.
- 21. This specifies the number of pixels horizontally and vertically. A higher number of pixels provides better resolution.
- 24. This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
- 26. These users can only make configuration changes that affect their own profile.
- 28. This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
- 29. The command that is used to query the DNS server to discover IP addresses or host names.
- 30. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
Down
- 1. To add an application to the taskbar for easy access, right-click the icon of an application and select Pin to taskbar.
- 3. Provides very weak security and should not be relied upon for confidentiality.
- 5. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
- 6. To view a thumbnail image of a running program, hover the mouse over the program icon on the taskbar.
- 9. Displays the Group Policy settings that are in effect for a currently logged in user.
- 10. These users can access files from other users. They also have elevated permission.
- 13. View the desktop icons that are behind open windows by placing your cursor over the Show desktop button found at the right edge of the taskbar.
- 15. A group of computers and electronic devices with a common set of rules and procedures administered as a unit.
- 16. A private network that connects remote sites or users together over a public network, like the internet.
- 18. The command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path.
- 19. A feature that enables a user to encrypt all data on a disk drive or removable drive.
- 20. A command-line terminal emulation protocol and program that works over port 23.
- 22. This sets how often the image in the screen is redrawn.
- 23. This determines whether the display appears in Landscape, Portrait, flipped Landscape, or flipped Portrait.
- 25. Minimizes all windows that are not being used by clicking and holding the title bar of one window and shaking it with the mouse.
- 27. A collection of LAN workstations and servers that are designed to communicate and exchange data with one another