1202 Crossword 11-15

1234567891011121314151617181920212223242526272829303132333435
Across
  1. 3. A framework that uses asymmetric encryption with paired public and private keys to secure communications, verify identities, and support digital signatures and certificates.
  2. 4. A modern disk partitioning standard that supports disks larger than 2 TB, allows more than four primary partitions, and is required for UEFI-based systems.
  3. 7. A policy that defines the rules and restrictions governing how employees may use an organization's computer systems, networks, and internet resources.
  4. 9. A critical Windows system error that causes the OS to stop completely to prevent data corruption, displaying a stop code that identifies the cause of the failure.
  5. 10. A centrally managed Windows network where a domain controller handles authentication and enforces group policies for all connected computers and users.
  6. 12. A software tool used to log, track, prioritize, and manage IT support requests from submission through resolution, ensuring accountability and clear communication throughout the support process.
  7. 13. A command-line network diagnostic tool that sends ICMP echo requests to a target host to test basic connectivity and measure round-trip response time.
  8. 15. A security principle that grants users and processes only the minimum permissions necessary to perform their jobs, reducing the potential damage from errors or malicious activity.
  9. 18. The process of referring an unresolved or complex support issue to a higher tier of support or to management when it cannot be handled at the current level.
  10. 22. A Windows management console that logs system, security, and application events, providing technicians with records of errors, warnings, and informational messages useful for troubleshooting.
  11. 24. A command-line tool that displays active TCP/UDP network connections, listening ports, and the processes that opened them, useful for detecting unauthorized connections.
  12. 26. A Windows console used to initialize disks, create and format partitions and volumes, assign drive letters, and manage storage configurations on local drives.
  13. 27. An authentication method requiring two or more verification factors from different categories — something you know, something you have, and something you are — to confirm a user's identity.
  14. 29. A Windows command-line utility that traces the route packets take to a destination, displaying each hop and its latency to help identify where network failures occur.
  15. 30. A peer-to-peer Windows network configuration where each computer manages its own user accounts and resources locally, without a central authentication server.
  16. 33. A Windows configuration utility that provides access to system settings including user accounts, hardware devices, network connections, and accessibility options.
  17. 34. A step-by-step list of actions that must be completed for a given task to comply with organizational policy. SOPs govern most IT procedures and ensure consistent, repeatable outcomes.
  18. 35. A Windows management console (devmgmt.msc) that displays all installed hardware, allows driver updates and rollbacks, and lets technicians enable, disable, or uninstall devices.
Down
  1. 1. A Microsoft directory service used in domain networks to centrally manage user accounts, computers, groups, and security policies across an organization.
  2. 2. A Windows command-line utility that displays the current IP configuration of all network adapters, and can release or renew DHCP leases using /release and /renew switches.
  3. 5. A Windows utility that displays running processes, CPU/memory/disk/network utilization, startup programs, and active users, used for performance monitoring and ending unresponsive applications.
  4. 6. A secure, encrypted tunnel established over a public network that allows remote users to access organizational resources as if they were directly connected to the internal network.
  5. 8. A Windows command-line tool for robust file copying that supports mirroring directory structures, resuming interrupted transfers, and copying file attributes and permissions.
  6. 11. A hierarchical database in Windows that stores configuration settings for the OS, hardware, applications, and user preferences, organized into hives such as HKLM and HKCU.
  7. 13. Windows settings that control how the computer manages energy use, including sleep, hibernate, and shutdown behaviors, configurable based on whether the device is plugged in or on battery.
  8. 14. A security model that assumes no user or device should be automatically trusted, requiring continuous verification of identity and authorization even within the internal network.
  9. 16. An authentication mechanism that allows a user to log in once and gain access to multiple systems or applications without re-entering credentials for each one.
  10. 17. A Windows security feature that prompts users for confirmation or administrator credentials before allowing actions that could affect system settings, reducing the risk of unauthorized changes.
  11. 19. A foundational cybersecurity model comprising Confidentiality (restricting data access to authorized users), Integrity (ensuring data accuracy), and Availability (ensuring resources are accessible when needed).
  12. 20. The modern Windows configuration interface introduced in Windows 8 and expanded in Windows 10/11, providing a touch-friendly alternative to the classic Control Panel.
  13. 21. Any error, unexpected situation, or event that disrupts normal service operations and requires a support response, as distinguished from a routine service request.
  14. 23. A Windows tool that automates the execution of scripts, programs, or maintenance tasks based on time triggers or system events, without requiring manual initiation.
  15. 25. A formal agreement that defines the level of service expected from an internal department or external vendor, including metrics like response times, uptime, and performance standards.
  16. 27. A legacy disk partitioning style that stores boot information in the first sector of a disk, supporting up to four primary partitions and drives up to 2 TB in size.
  17. 28. A Windows feature that assigns a self-configured IP address in the 169.254.x.y range when a device cannot reach a DHCP server, indicating a network configuration problem.
  18. 31. A Microsoft protocol that allows a user to connect to and control a remote Windows computer over a network, providing full graphical access to the remote desktop.
  19. 32. A Windows management tool used to configure security policies, user rights, and system behaviors for local computers or across a domain network.