Per 3 Chapter 11 - Alvarez, B

123456789101112131415161718192021222324252627282930
Across
  1. 3. a basic disk that is being converted into a dynamic disk
  2. 5. A group electronics which follow a set of rules as a unit
  3. 6. user on a computer that has elevated permissions
  4. 7. forces a DHCP client to renew its DHCP address lease from the DHCP server
  5. 8. Command that tests connectivity between devices using request and reply messages.
  6. 12. application that allows the creation of custom management consoles for collections of utilities and tools from Microsoft or other sources
  7. 14. command that deletes all command output and moves the command prompt to the top of the command window
  8. 15. used to update a local machine and verify it is receiving group policy updates
  9. 17. provides weak security (shouldn't be relied upon)
  10. 19. key that displays previously entered commands
  11. 20. displays additional network configuration information including DHCP, DNS servers, mac address, NetBios status and domain name
  12. 21. releases the IP address learned from the DHCP server
  13. 22. monitors programs on a system and warns users of potential threats
  14. 24. command that is used to query the DNS server to discover IP addresses or host names
  15. 26. A volume that is functioning properly
  16. 29. folder that contains most of the files that are used to run the computer
  17. 30. command that traces the route that packets take from your computer to a destination host (displays where packets are lost)
Down
  1. 1. opens the remote desktop utility
  2. 2. virtual private network
  3. 4. clears the DNS resolver cache on the host
  4. 9. displays the DNS resolver cache which contains host and domain names that have been recently queried
  5. 10. service which provides encryption to an entire volume of disk data to void access by unauthorized parties
  6. 11. command which opens its own command prompt (many functions of the windows disk management utility can be performed here)
  7. 13. displays group policy settings in effect for the current user
  8. 16. command-line terminal emulation protocol and program that works over port 23
  9. 18. virtual folder with content from different locations
  10. 23. secure alternative to telnet and communicates over TCP port 22
  11. 25. used to create customized system image files
  12. 27. command to see the shared network Resorces available to a user
  13. 28. command which repairs or replaces protected system files that may have been corrupted