Across
- 2. Controls user and computer settings in domains
- 4. Secure network authentication protocol for encrypted connections
- 6. Encryption tool for protecting drive data security
- 7. Application set to open specific file types
- 10. Navigates and manages files and folders
- 13. Command-line tool for task automation and scripting
- 18. Enables file access without network connectivity
- 19. Displays open applications, shortcuts, and notifications
- 20. Security prompt for administrative privilege actions
- 21. Monitors applications, processes, and system performance
- 23. Web-based platform for collaboration and document management
- 25. Database of system and application configuration settings
- 26. Properties defining file characteristics and access permissions
- 28. Hierarchical arrangement of files and folders
- 31. Diagnoses DirectX issues and system hardware specifications
- 32. Logs failed security events, unauthorized access attempts
- 33. Remote access protocols
Down
- 1. Hosts management tools for system administration tasks
- 3. Analyzes real-time system performance and resource usage
- 5. Logs, reviews system and application event information
- 8. Caches files locally, reducing WAN bandwidth usage
- 9. Manages installed hardware devices and driver software
- 11. Identifiers for file types and associated programs
- 12. Directory service managing users, computers, network resources
- 14. Graphical interface for interacting with Windows system
- 15. Peer-to-peer network without centralized authentication control
- 16. Network structure grouping computers, users, security policies
- 17. Text-based interface for executing system commands
- 22. Encrypts files, ensuring only authorized access
- 24. Tool for viewing, editing Windows registry settings database
- 27. Hidden network share for system management purposes
- 29. Configuration hub for Windows system settings customization
- 30. Combines multiple drives for redundancy, speed improvements
