Tilahune's puzzle

1234567891011121314151617181920
Across
  1. 3. ___is The most widely used method for encrypting data
  2. 4. In Windows OSs,______ is used to encrypt files and folders
  3. 5. testers who are paid to probe networks and report vulnerabilities
  4. 7. a framework for other protocols that provide encryption and authentication
  5. 8. ___is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
  6. 10. an industry-standard client/server protocol that offers centralized control
  7. 12. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  8. 14. A command-line program commonly used by many Linux administrators to see the current firewall configuration
  9. 15. used in a Windows domain environment and provides mutual authentication
  10. 16. True or False: an encrypting system, EFS works in one of three modes: transparent mode, USB key mode, and user authentication mode
  11. 18. attackers who do not report problems, but instead disseminate the information to other black hat attackers
  12. 19. True or False: disk quota is a specially allocated disk area that holds information that is swapped back and forth from RAM to disk?
  13. 20. ___is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
Down
  1. 1. only backs up files that have changed since the last full backup
  2. 2. ___is a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity (an administrator enters the same key in the IPsec settings on both devices)
  3. 6. ___is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  4. 9. True or False: Data can be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
  5. 11. creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
  6. 13. True or False: acceptable use policy is a security policy describes how users identify themselves to gain access to network resources?
  7. 17. backs up the disk sector by sector to create an exact image of the disk’s contents