Across
- 3. A framework that uses asymmetric encryption with paired public and private keys to secure communications, verify identities, and support digital signatures and certificates.
- 4. A modern disk partitioning standard that supports disks larger than 2 TB, allows more than four primary partitions, and is required for UEFI-based systems.
- 7. A policy that defines the rules and restrictions governing how employees may use an organization's computer systems, networks, and internet resources.
- 9. A critical Windows system error that causes the OS to stop completely to prevent data corruption, displaying a stop code that identifies the cause of the failure.
- 10. A centrally managed Windows network where a domain controller handles authentication and enforces group policies for all connected computers and users.
- 12. A software tool used to log, track, prioritize, and manage IT support requests from submission through resolution, ensuring accountability and clear communication throughout the support process.
- 13. A command-line network diagnostic tool that sends ICMP echo requests to a target host to test basic connectivity and measure round-trip response time.
- 15. A security principle that grants users and processes only the minimum permissions necessary to perform their jobs, reducing the potential damage from errors or malicious activity.
- 18. The process of referring an unresolved or complex support issue to a higher tier of support or to management when it cannot be handled at the current level.
- 22. A Windows management console that logs system, security, and application events, providing technicians with records of errors, warnings, and informational messages useful for troubleshooting.
- 24. A command-line tool that displays active TCP/UDP network connections, listening ports, and the processes that opened them, useful for detecting unauthorized connections.
- 26. A Windows console used to initialize disks, create and format partitions and volumes, assign drive letters, and manage storage configurations on local drives.
- 27. An authentication method requiring two or more verification factors from different categories — something you know, something you have, and something you are — to confirm a user's identity.
- 29. A Windows command-line utility that traces the route packets take to a destination, displaying each hop and its latency to help identify where network failures occur.
- 30. A peer-to-peer Windows network configuration where each computer manages its own user accounts and resources locally, without a central authentication server.
- 33. A Windows configuration utility that provides access to system settings including user accounts, hardware devices, network connections, and accessibility options.
- 34. A step-by-step list of actions that must be completed for a given task to comply with organizational policy. SOPs govern most IT procedures and ensure consistent, repeatable outcomes.
- 35. A Windows management console (devmgmt.msc) that displays all installed hardware, allows driver updates and rollbacks, and lets technicians enable, disable, or uninstall devices.
Down
- 1. A Microsoft directory service used in domain networks to centrally manage user accounts, computers, groups, and security policies across an organization.
- 2. A Windows command-line utility that displays the current IP configuration of all network adapters, and can release or renew DHCP leases using /release and /renew switches.
- 5. A Windows utility that displays running processes, CPU/memory/disk/network utilization, startup programs, and active users, used for performance monitoring and ending unresponsive applications.
- 6. A secure, encrypted tunnel established over a public network that allows remote users to access organizational resources as if they were directly connected to the internal network.
- 8. A Windows command-line tool for robust file copying that supports mirroring directory structures, resuming interrupted transfers, and copying file attributes and permissions.
- 11. A hierarchical database in Windows that stores configuration settings for the OS, hardware, applications, and user preferences, organized into hives such as HKLM and HKCU.
- 13. Windows settings that control how the computer manages energy use, including sleep, hibernate, and shutdown behaviors, configurable based on whether the device is plugged in or on battery.
- 14. A security model that assumes no user or device should be automatically trusted, requiring continuous verification of identity and authorization even within the internal network.
- 16. An authentication mechanism that allows a user to log in once and gain access to multiple systems or applications without re-entering credentials for each one.
- 17. A Windows security feature that prompts users for confirmation or administrator credentials before allowing actions that could affect system settings, reducing the risk of unauthorized changes.
- 19. A foundational cybersecurity model comprising Confidentiality (restricting data access to authorized users), Integrity (ensuring data accuracy), and Availability (ensuring resources are accessible when needed).
- 20. The modern Windows configuration interface introduced in Windows 8 and expanded in Windows 10/11, providing a touch-friendly alternative to the classic Control Panel.
- 21. Any error, unexpected situation, or event that disrupts normal service operations and requires a support response, as distinguished from a routine service request.
- 23. A Windows tool that automates the execution of scripts, programs, or maintenance tasks based on time triggers or system events, without requiring manual initiation.
- 25. A formal agreement that defines the level of service expected from an internal department or external vendor, including metrics like response times, uptime, and performance standards.
- 27. A legacy disk partitioning style that stores boot information in the first sector of a disk, supporting up to four primary partitions and drives up to 2 TB in size.
- 28. A Windows feature that assigns a self-configured IP address in the 169.254.x.y range when a device cannot reach a DHCP server, indicating a network configuration problem.
- 31. A Microsoft protocol that allows a user to connect to and control a remote Windows computer over a network, providing full graphical access to the remote desktop.
- 32. A Windows management tool used to configure security policies, user rights, and system behaviors for local computers or across a domain network.
