A+

123456789101112131415161718
Across
  1. 2. A type of software designed to steal personal data.
  2. 5. A Microsoft cloud storage service.
  3. 6. A protocol used for remote desktop access.
  4. 8. A method used to prevent unauthorized access by requiring two credentials.
  5. 11. Background processes.
  6. 13. A Windows recovery option for rolling back changes.
  7. 16. A type of social engineering where an attacker impersonates someone trusted.
  8. 17. A feature that allows users to run older programs on new Windows versions.
Down
  1. 1. A Windows security tool that helps prevent malware infections.
  2. 3. A virtualization platform for running multiple OS.
  3. 4. A type of virus that hides within legitimate software.
  4. 7. A type of cyberattack that floods a system with traffic.
  5. 9. A type of attack that intercepts and alters communication.
  6. 10. A method of verifying system integrity using cryptography.
  7. 12. A Windows feature that encrypts individual files and folders.
  8. 14. A security policy that enforces password changes.
  9. 15. A type of malware that locks users out of their system.
  10. 18. A command used to trace network routes.