LESSSON 8 AB

1234567891011121314151617181920
Across
  1. 3. only backs up files that have changed since the last full backup.
  2. 6. creates a barrier between two entities.
  3. 8. a framework for other protocols that provide encryption and authentication
  4. 9. backs up any files that have changed since the last full or incremental backup.
  5. 10. an industry standard client/server protocol that offers centralized control
  6. 12. certificates involve a certification authority (CA)
  7. 13. prevents people from using eavesdropping technology, such as a
  8. 14. involve a certification authority
  9. 16. is used to encrypt files and folders in Window OSs
  10. 18. used in a Windows domain environment and provides mutual
  11. 19. terms best describes a specially allocated disk area that holds information that is swapped back and forth from RAM to disk?
Down
  1. 1. good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen.
  2. 2. element of a security policy describes how users identify themselves to gain access to network resources?
  3. 4. backs up the disk sector by sector to create an exact image of the disk’s contents.
  4. 5. what users can do after they are logged on to the network
  5. 7. on an OS involves authentication, authorization, encryption, and malware protection.
  6. 11. backup all of the disk’s contents are backed up as individual folders and files.
  7. 15. The most widely used method for encrypting data.
  8. 17. Windows Server comes with an update management system
  9. 20. a layer of software that operates between the NIC and OS services and applications.