Per 1 Chapter 11 - Rivas, B

123456789101112131415161718192021222324252627282930
Across
  1. 2. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
  2. 4. Forces a DHCP client to renew its DHCP address lease from the DHCP server.
  3. 8. the command that is used to query the DNS server to discover IP addresses or host names.
  4. 10. A command-line terminal emulation protocol and program that works over port 23.
  5. 12. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
  6. 16. A feature that enables a user to encrypt all data on a disk drive or removable drive.
  7. 17. a private network that connects remote sites or users together over a public network, like the internet.
  8. 21. The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
  9. 25. Releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address.
  10. 26. The command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path.
  11. 27. Released in October 2009.
  12. 28. Monitors programs on the computer and warns users when an action might present a threat to the computer.
  13. 29. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
  14. 30. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
Down
  1. 1. Displays the DNS resolver cache, which contains host and domain names that have been recently queried.
  2. 3. contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32.
  3. 5. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
  4. 6. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another.
  5. 7. What is the name for EFS.
  6. 9. Became available in July 2015.
  7. 11. These are identified with a dollar sign ($) at the end of the share name.
  8. 13. This is used to open or execute a file using elevated permission.
  9. 14. Clears the DNS resolver cache on the host.
  10. 15. The command that tests basic connectivity between devices by using ICMP echo request and reply messages.
  11. 18. Provides very weak security and should not be relied upon for confidentiality.
  12. 19. a group of computers and electronic devices with a common set of rules and procedures administered as a unit.
  13. 20. Data is sent unencrypted and with no authentication.
  14. 22. This is the name for GUI.
  15. 23. Displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name.
  16. 24. Released in October of 2012.