Across
- 2. A common method for securing Wi-Fi networks.
- 3. A software used to detect and remove malware.
- 4. A Windows utility that displays real-time network usage.
- 9. A Windows command used to format a disk.
- 10. A network protocol used to automatically assign IP addresses.
- 11. A form of authentication that uses fingerprints or facial recognition.
- 13. A Windows component used to view system performance and logs.
- 15. A tool for managing group policies in Windows.
- 16. A network security system that monitors and filters incoming/outgoing traffic.
Down
- 1. A security method that removes unnecessary user privileges.
- 5. A security setting requiring a user to change their password after a period.
- 6. A Linux command used to move files.
- 7. A security setting that locks a user account after too many failed logins.
- 8. A bootable Windows environment used for troubleshooting.
- 10. A process that translates domain names into IP addresses.
- 12. A Linux command used to change file permissions.
- 14. A Windows command used to display active network connections.
- 17. A Linux command used to list directory contents.
