Slande Cheridor
Across
- 2. testers who are paid to probe networks and report vulnerabilities
- 6. what the user has (smart card or key)
- 8. a server role that makes it possible for administrators to take control of Microsoft product updates
- 10. The most widely used method for encrypting data
- 11. security features that enable administrators to control who has access to the network
- 14. an industry-standard client/server protocol that offers centralized control
- 15. security features that enable administrators to control what users can do after they are logged on to the network
- 16. used in a Windows domain environment and provides mutual authentication
- 17. backs up the disk sector by sector to create an exact image of the disk’s contents
- 18. framework for other protocols that provide encryption and authentication
- 19. A common tool used by many Linux administrators
- 20. a good security enhancement for servers that aren’t physically secure
Down
- 1. can be set in the Local Security Policy console found in Administrative Tools
- 3. allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
- 4. tool used to delete unneeded files in Windows
- 5. disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- 7. a unique biometric identifying trait. What the user is
- 9. document that describes the rules governing access to an organization’s information resources
- 12. creates a barrier between two entities
- 13. prevents people from using eavesdropping technology