Across
- 3. only backs up files that have changed since the last full backup.
- 6. creates a barrier between two entities.
- 8. a framework for other protocols that provide encryption and authentication
- 9. backs up any files that have changed since the last full or incremental backup.
- 10. an industry standard client/server protocol that offers centralized control
- 12. certificates involve a certification authority (CA)
- 13. prevents people from using eavesdropping technology, such as a
- 14. involve a certification authority
- 16. is used to encrypt files and folders in Window OSs
- 18. used in a Windows domain environment and provides mutual
- 19. terms best describes a specially allocated disk area that holds information that is swapped back and forth from RAM to disk?
Down
- 1. good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen.
- 2. element of a security policy describes how users identify themselves to gain access to network resources?
- 4. backs up the disk sector by sector to create an exact image of the disk’s contents.
- 5. what users can do after they are logged on to the network
- 7. on an OS involves authentication, authorization, encryption, and malware protection.
- 11. backup all of the disk’s contents are backed up as individual folders and files.
- 15. The most widely used method for encrypting data.
- 17. Windows Server comes with an update management system
- 20. a layer of software that operates between the NIC and OS services and applications.
