Per 2 Chapter 11 - A, Hernandz
Across
- 2. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
- 4. as Administration This is used to open or execute a file using elevated permission.
- 6. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
- 9. This is used to update a local machine and verify that the machine is getting Group Policy updates.
- 15. Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).
- 16. contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
- 17. opens the System Information window, which shows a summary of system components, including hardware components and software information
- 18. a private network that connects remote sites or users together over a public network, like the internet
- 19. Shell (SSH) This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
- 23. This command is extremely powerful with many options for the way that files are copied, the types of files to include in the copy action, and the file attributes to include for the destination files.
- 27. a volume that is functioning properly
- 28. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
- 29. uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
- 30. This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
- 32. It displays details for all DirectX components and drivers that are installed in a computer.
Down
- 1. a dynamic disk that has been moved to a computer from another computer running Windows
- 3. used by most application installation programs to install software. In 32-bit versions of Windows, all programs are 32-bit and are installed in the folder C:\Program Files. In 64-bit systems, 64-bit programs are installed in the folder C:\Program Files, while 32-bit programs are installed in the folder C:\Program Files (x86).
- 5. displays the Group Policy settings that are in effect for a currently logged in user
- 7. authentication This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
- 8. provides very weak security and should not be relied upon for confidentiality
- 10. The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
- 11. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
- 12. Microsoft Management Console (MMC)
- 13. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
- 14. a command-line terminal emulation protocol and program that works over port 23
- 20. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
- 21. monitors programs on the computer and warns users when an action might present a threat to the computer
- 22. This is used to create customized system image files that will be installed on computers in the enterprise.
- 24. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
- 25. the command that is used to query the DNS server to discover IP addresses or host names
- 26. opens the Remote Desktop utili
- 31. authentication (Open) Data is sent unencrypted and with no authentication.