Tilahune's puzzle
Across
- 3. ___is The most widely used method for encrypting data
- 4. In Windows OSs,______ is used to encrypt files and folders
- 5. testers who are paid to probe networks and report vulnerabilities
- 7. a framework for other protocols that provide encryption and authentication
- 8. ___is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
- 10. an industry-standard client/server protocol that offers centralized control
- 12. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- 14. A command-line program commonly used by many Linux administrators to see the current firewall configuration
- 15. used in a Windows domain environment and provides mutual authentication
- 16. True or False: an encrypting system, EFS works in one of three modes: transparent mode, USB key mode, and user authentication mode
- 18. attackers who do not report problems, but instead disseminate the information to other black hat attackers
- 19. True or False: disk quota is a specially allocated disk area that holds information that is swapped back and forth from RAM to disk?
- 20. ___is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
Down
- 1. only backs up files that have changed since the last full backup
- 2. ___is a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity (an administrator enters the same key in the IPsec settings on both devices)
- 6. ___is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- 9. True or False: Data can be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- 11. creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- 13. True or False: acceptable use policy is a security policy describes how users identify themselves to gain access to network resources?
- 17. backs up the disk sector by sector to create an exact image of the disk’s contents