Across
- 4. Multifactor Authentication
- 8. what users can do after they are logged on to the network.
- 9. Most Linux distributions have a built-in firewall called
- 12. Encrypting File System.
- 13. prevents people from using eavesdropping technology, such as a protocol analyzer.
- 15. Windows Server Update Services
- 16. a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen host firewall a barrier between a computer OS and the network so potentially. harmful packets can’t enter or leave the OS
- 17. backup backs up the disk sector by sector to create an exact image of the disk’s contents.
- 19. file allocated disk area that holds information that is swapped back and forth from RAM to disk.
- 21. firewall creates a barrier between networks so that potentially.harmful packets can’t enter or leave the protected networks.
- 22. packets can’t enter or leave the protected networks
Down
- 1. certificates a digital certificate from a CA, which is responsible for verifying the applicant’s authenticity.
- 2. policy a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps
- 3. management to take control of Microsoft product updates a process is called.
- 5. who has access to the network.
- 6. if rules are breached.
- 7. firewall
- 10. a unique biometric identifying trait.
- 11. key series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
- 14. Password Authentication Protocol
- 18. hat who are paid to probe networks and vulnerabilities.
- 20. creates a barrier between two entities.
