Across
- 2. An important identifier for wireless networks
- 3. Making a copy of data to prevent data loss in case of hardware failure or other issues
- 6. The process of identifying and resolving issues or problems within a computer system or network
- 9. Refers to both the physical and logical layout of a network
- 12. A type of software that is designed to disrupt, damage, or gain unauthorized access to computer systems
- 14. A software program responsible for loading the operating system during the boot process
- 15. A technique used to increase data redundancy and protect against data loss in storage systems
- 17. A process of converting data into a code to prevent unauthorized access during transmission or storage
- 18. This topology gives insights about a network's physical design
Down
- 1. A network security system that monitors and controls incoming and outgoing network traffic
- 3. A method of securing data by encrypting the entire hard drive
- 4. A global network of remote servers
- 5. A protocol used for secure remote access to a private network over the internet
- 6. A type of malware disguises itself as legitimate software
- 7. This virtualization type allows multiple virtual machines to run on a single host OS?
- 8. A unique numerical label assigned to each device connected to a computer network
- 10. The software that manages and controls computer hardware and software resources
- 11. An encryption method uses a single secret key to both encrypt and decrypt data
- 13. A protocol currently used for encryption of information being transmitted between wireless routers and wireless devices
- 16. A protocol used to dynamically assign IP addresses to devices on a network