1202 Chapter 16-19

123456789101112131415161718192021222324252627282930
Across
  1. 2. The current wireless security protocol standard offering stronger encryption and protection against brute-force attacks compared to its predecessors WEP, WPA, and WPA2.
  2. 7. The name that identifies a wireless network. Hiding the SSID reduces casual discovery of the network but does not provide strong security on its own.
  3. 10. An OS installation performed on a blank or reformatted disk, removing all existing data and configurations, typically used for new systems or when upgrading from an incompatible version.
  4. 13. A UEFI firmware feature that prevents the system from loading unauthorized or unsigned bootloaders and OS components, protecting against rootkits and boot-sector malware.
  5. 15. Microsoft's built-in endpoint security tool that provides real-time protection against malware by scanning files, monitoring system behavior, and using regularly updated virus definitions.
  6. 16. A set of psychological manipulation techniques used by threat actors to deceive people into revealing confidential information or granting unauthorized access to systems.
  7. 18. Windows edition that adds BitLocker, Remote Desktop hosting, domain join, and Group Policy
  8. 19. A common Linux bootloader that initializes the system, loads the kernel into memory, and supports multi-boot configurations that allow multiple operating systems on the same device.
  9. 22. A network segment that sits between the internal trusted network and the external internet, used to host publicly accessible services (like web servers) while isolating them from the internal network.
  10. 23. A type of spyware that secretly records every keystroke made on a device, capturing passwords, credit card numbers, and other sensitive information and transmitting them to an attacker.
  11. 24. An account management policy that grants users only the permissions necessary to perform their assigned tasks, minimizing the potential damage from accidents, errors, or compromised accounts.
  12. 27. A logical division of a physical disk that the OS treats as a separate storage unit, allowing multiple volumes to exist on a single physical drive.
  13. 28. A network security device or software that monitors and controls incoming and outgoing traffic based on defined rules, creating a security border between trusted and untrusted networks.
  14. 29. A software flaw that is exploited by attackers before the developer is aware of it or has issued a patch, leaving systems with no available defense during the exposure window.
  15. 30. A router configuration that directs incoming traffic on a specific external port to a designated internal IP address and port, allowing external access to internal services.
Down
  1. 1. Add-on software that extends browser functionality; extensions can pose security risks if obtained from untrusted sources, as they may access browsing history, credentials, or inject malicious code.
  2. 3. A tool used in Linux distributions to automate the installation, updating, and removal of software packages from a central repository (e.g., apt for Debian/Ubuntu, dnf for Fedora).
  3. 4. A command-line environment in Linux or macOS that interprets user commands and passes them to the OS kernel for execution. Common shells include bash, zsh, and ksh.
  4. 5. Windows full-disk encryption feature that protects data by encrypting entire volumes, using a TPM chip or startup key to prevent unauthorized access to stored data.
  5. 6. Apple's built-in macOS backup utility that automatically creates hourly, daily, and weekly backups of the entire system to an external drive, enabling file-level and full system recovery.
  6. 8. A complete operating system built on the Linux kernel, bundled with a package manager, software repository, and customizable shell and applications (e.g., Ubuntu, Fedora, Debian).
  7. 9. A type of malware designed to hide its presence and that of other malicious software on a system by modifying core OS components, making it difficult to detect and remove.
  8. 11. An automated OS deployment method using a preconfigured answer file to respond to setup prompts, enabling large-scale rollouts without requiring manual input at each machine.
  9. 12. The core component of the Linux operating system that manages hardware resources, enables communication between software and hardware, and forms the foundation of all Linux distributions.
  10. 14. A Linux command used to change the access permissions of files and directories, specifying read (4), write (2), and execute (1) rights for owner, group, and others.
  11. 17. A Linux command-line tool that searches files or output for lines matching a specified pattern or regular expression, commonly used for filtering log files and text output.
  12. 18. A network booting method that allows a computer to load and install an OS over the network from a server, without requiring local boot media.
  13. 20. A Type of malware that encrypts a victim's files or locks the system and demands payment — usually in cryptocurrency — in exchange for the decryption key or restored access.
  14. 21. A Linux command that allows a permitted user to execute a command as the superuser (root) or another user, providing temporary elevated privileges without logging in as root.
  15. 25. Any software intentionally designed to disrupt, damage, or gain unauthorized access to computer systems, including viruses, trojans, ransomware, spyware, adware, and rootkits.
  16. 26. An OS installation that replaces the existing version while preserving user files, applications, and settings, allowing a system to move to a newer Windows version with minimal disruption.
  17. 28. The default file manager and graphical interface shell in macOS, equivalent to File Explorer in Windows, used to navigate the file system and launch applications.
  18. 30. A social engineering attack delivered via email (or other communication channels) that tricks recipients into clicking malicious links, downloading malware, or surrendering credentials.