securing and maintaining an OS

12345678910111213141516171819202122
Across
  1. 4. Multifactor Authentication
  2. 8. what users can do after they are logged on to the network.
  3. 9. Most Linux distributions have a built-in firewall called
  4. 12. Encrypting File System.
  5. 13. prevents people from using eavesdropping technology, such as a protocol analyzer.
  6. 15. Windows Server Update Services
  7. 16. a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen host firewall a barrier between a computer OS and the network so potentially. harmful packets can’t enter or leave the OS
  8. 17. backup backs up the disk sector by sector to create an exact image of the disk’s contents.
  9. 19. file allocated disk area that holds information that is swapped back and forth from RAM to disk.
  10. 21. firewall creates a barrier between networks so that potentially.harmful packets can’t enter or leave the protected networks.
  11. 22. packets can’t enter or leave the protected networks
Down
  1. 1. certificates a digital certificate from a CA, which is responsible for verifying the applicant’s authenticity.
  2. 2. policy a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps
  3. 3. management to take control of Microsoft product updates a process is called.
  4. 5. who has access to the network.
  5. 6. if rules are breached.
  6. 7. firewall
  7. 10. a unique biometric identifying trait.
  8. 11. key series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
  9. 14. Password Authentication Protocol
  10. 18. hat who are paid to probe networks and vulnerabilities.
  11. 20. creates a barrier between two entities.