Per 3 Chapter 11 - Alvarez, B
Across
- 3. a basic disk that is being converted into a dynamic disk
- 5. A group electronics which follow a set of rules as a unit
- 6. user on a computer that has elevated permissions
- 7. forces a DHCP client to renew its DHCP address lease from the DHCP server
- 8. Command that tests connectivity between devices using request and reply messages.
- 12. application that allows the creation of custom management consoles for collections of utilities and tools from Microsoft or other sources
- 14. command that deletes all command output and moves the command prompt to the top of the command window
- 15. used to update a local machine and verify it is receiving group policy updates
- 17. provides weak security (shouldn't be relied upon)
- 19. key that displays previously entered commands
- 20. displays additional network configuration information including DHCP, DNS servers, mac address, NetBios status and domain name
- 21. releases the IP address learned from the DHCP server
- 22. monitors programs on a system and warns users of potential threats
- 24. command that is used to query the DNS server to discover IP addresses or host names
- 26. A volume that is functioning properly
- 29. folder that contains most of the files that are used to run the computer
- 30. command that traces the route that packets take from your computer to a destination host (displays where packets are lost)
Down
- 1. opens the remote desktop utility
- 2. virtual private network
- 4. clears the DNS resolver cache on the host
- 9. displays the DNS resolver cache which contains host and domain names that have been recently queried
- 10. service which provides encryption to an entire volume of disk data to void access by unauthorized parties
- 11. command which opens its own command prompt (many functions of the windows disk management utility can be performed here)
- 13. displays group policy settings in effect for the current user
- 16. command-line terminal emulation protocol and program that works over port 23
- 18. virtual folder with content from different locations
- 23. secure alternative to telnet and communicates over TCP port 22
- 25. used to create customized system image files
- 27. command to see the shared network Resorces available to a user
- 28. command which repairs or replaces protected system files that may have been corrupted