Rubens CrossWord - Module 11 OS - 12/09/2024

1234567891011121314151617181920
Across
  1. 2. what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern)
  2. 6. A document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached.
  3. 7. Microsoft Challenge Handshake Authentication Protocol.
  4. 10. Enable administrators to control who has access to the network.
  5. 12. A..........creates a barrier between two entities.
  6. 15. A............creates a barrier between a computer OS and the network.
  7. 16. The most widely used method for encrypting data.
  8. 19. ....... testers who are paid to probe networks and report vulnerabilities.
  9. 20. What users can do after they are logged on to the network.
Down
  1. 1. Used in a Windows domain environment and provides mutual authentication.
  2. 3. A....................creates a barrier between networks.
  3. 4. A good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
  4. 5. By ...... attackers who do not report problems, but instead disseminate the information to other black hat attackers.
  5. 8. Password Authentication Protocol.
  6. 9. What the user knows (smart card or key).
  7. 11. Encrypting File System.
  8. 13. What the user has (smart card or key).
  9. 14. Multifactor Authentication.
  10. 17. Remote Authentication Dial-In User Service.
  11. 18. Extensible Authentication Protocol.