Across
- 2. The current wireless security protocol standard offering stronger encryption and protection against brute-force attacks compared to its predecessors WEP, WPA, and WPA2.
- 7. The name that identifies a wireless network. Hiding the SSID reduces casual discovery of the network but does not provide strong security on its own.
- 10. An OS installation performed on a blank or reformatted disk, removing all existing data and configurations, typically used for new systems or when upgrading from an incompatible version.
- 13. A UEFI firmware feature that prevents the system from loading unauthorized or unsigned bootloaders and OS components, protecting against rootkits and boot-sector malware.
- 15. Microsoft's built-in endpoint security tool that provides real-time protection against malware by scanning files, monitoring system behavior, and using regularly updated virus definitions.
- 16. A set of psychological manipulation techniques used by threat actors to deceive people into revealing confidential information or granting unauthorized access to systems.
- 18. Windows edition that adds BitLocker, Remote Desktop hosting, domain join, and Group Policy
- 19. A common Linux bootloader that initializes the system, loads the kernel into memory, and supports multi-boot configurations that allow multiple operating systems on the same device.
- 22. A network segment that sits between the internal trusted network and the external internet, used to host publicly accessible services (like web servers) while isolating them from the internal network.
- 23. A type of spyware that secretly records every keystroke made on a device, capturing passwords, credit card numbers, and other sensitive information and transmitting them to an attacker.
- 24. An account management policy that grants users only the permissions necessary to perform their assigned tasks, minimizing the potential damage from accidents, errors, or compromised accounts.
- 27. A logical division of a physical disk that the OS treats as a separate storage unit, allowing multiple volumes to exist on a single physical drive.
- 28. A network security device or software that monitors and controls incoming and outgoing traffic based on defined rules, creating a security border between trusted and untrusted networks.
- 29. A software flaw that is exploited by attackers before the developer is aware of it or has issued a patch, leaving systems with no available defense during the exposure window.
- 30. A router configuration that directs incoming traffic on a specific external port to a designated internal IP address and port, allowing external access to internal services.
Down
- 1. Add-on software that extends browser functionality; extensions can pose security risks if obtained from untrusted sources, as they may access browsing history, credentials, or inject malicious code.
- 3. A tool used in Linux distributions to automate the installation, updating, and removal of software packages from a central repository (e.g., apt for Debian/Ubuntu, dnf for Fedora).
- 4. A command-line environment in Linux or macOS that interprets user commands and passes them to the OS kernel for execution. Common shells include bash, zsh, and ksh.
- 5. Windows full-disk encryption feature that protects data by encrypting entire volumes, using a TPM chip or startup key to prevent unauthorized access to stored data.
- 6. Apple's built-in macOS backup utility that automatically creates hourly, daily, and weekly backups of the entire system to an external drive, enabling file-level and full system recovery.
- 8. A complete operating system built on the Linux kernel, bundled with a package manager, software repository, and customizable shell and applications (e.g., Ubuntu, Fedora, Debian).
- 9. A type of malware designed to hide its presence and that of other malicious software on a system by modifying core OS components, making it difficult to detect and remove.
- 11. An automated OS deployment method using a preconfigured answer file to respond to setup prompts, enabling large-scale rollouts without requiring manual input at each machine.
- 12. The core component of the Linux operating system that manages hardware resources, enables communication between software and hardware, and forms the foundation of all Linux distributions.
- 14. A Linux command used to change the access permissions of files and directories, specifying read (4), write (2), and execute (1) rights for owner, group, and others.
- 17. A Linux command-line tool that searches files or output for lines matching a specified pattern or regular expression, commonly used for filtering log files and text output.
- 18. A network booting method that allows a computer to load and install an OS over the network from a server, without requiring local boot media.
- 20. A Type of malware that encrypts a victim's files or locks the system and demands payment — usually in cryptocurrency — in exchange for the decryption key or restored access.
- 21. A Linux command that allows a permitted user to execute a command as the superuser (root) or another user, providing temporary elevated privileges without logging in as root.
- 25. Any software intentionally designed to disrupt, damage, or gain unauthorized access to computer systems, including viruses, trojans, ransomware, spyware, adware, and rootkits.
- 26. An OS installation that replaces the existing version while preserving user files, applications, and settings, allowing a system to move to a newer Windows version with minimal disruption.
- 28. The default file manager and graphical interface shell in macOS, equivalent to File Explorer in Windows, used to navigate the file system and launch applications.
- 30. A social engineering attack delivered via email (or other communication channels) that tricks recipients into clicking malicious links, downloading malware, or surrendering credentials.
