Across
- 2. Contains users and computer settings and policies.
- 4. This configuration change allows admins to improve VoIP.
- 6. The amount of time that the data can be stored in the DNS cache.
- 8. This technology is also referred to as a PAN.
- 11. A group of networks that are geographically isolated but are connected by ISPs.
- 13. This email protocol is used to send emails.
- 14. Changing this value in Task Manager provides adequate attention from the system CPU to a process.
- 16. A secure remote access protocol.
- 19. Is used to encrypt the entire volume.
- 21. IP address on the 169.254.0.0 network assigned by hosts to themselves.
- 22. Public key encryption happens in this OSI model layer.
- 24. File Access Protocol which can be protected.
- 25. Windows admin utility that allows admins to aggregate different admin tools.
- 27. A list that contains information on allowed and denied access to folders and files.
- 32. Tis virtualization component provides the hardware needed.
- 33. The DNS servers hold the original and official DNS records for a specific domain.
- 34. This kernel component moves the data of an app not currently being accessed from RAM to a paging file.
- 35. This email Protocol is used to retrieve emails.
- 37. In a TCP connection hosts send this packet to establish a connection.
- 38. The rights granted to a user or group to access files and folders.
- 40. A thin layer of software that resides between the virtual machine and hardware.
- 42. This Linux command is used to change permissions.
- 44. This attribute is unique for all objects in a domain.
- 45. Is responsible for converting logical data into an acceptable form for transmission.
- 46. Hubs physical topology.
- 47. This OSI model layer is responsible for end-to-end communication.
- 48. This command allows you to resolve a hostname to its associated IP address.
- 51. A type of system software on SOHO routers.
- 53. This type of Windows installation is used when a compatible OS needs to be upgraded.
Down
- 1. .com, .net, and .ca are registered under this DNS server.
- 3. This topology describes how the network's computers are connected.
- 5. TCP protocol sends this to start the handshake negotiation.
- 6. A reliable Transport layer protocol.
- 7. Is a lightweight Active Directory Protocol.
- 9. In this network type, organization resources are shared with suppliers.
- 10. A file created by the hypervisor to store data.
- 12. The process of proving someone's identity.
- 15. This application layer protocol uses TCP port 3389.
- 17. Simple Multi-tenancy is associated with this cloud type.
- 18. This wireless feature allows a printer connection with the least effort.
- 20. Type of network is available privately to employees.
- 23. Disabling this option creates unique permissions for a folder.
- 26. These types of groups are created mainly for permissions.
- 28. This application layer protocol uses TCP port 389.
- 29. This cloud solution delivers everything a developer needs.
- 30. This backup solution backs up every file that has changed since the last full backup.
- 31. This VPN provides both authentication and encryption.
- 36. The network name on a wireless network.
- 39. The frequency at which your router sends and receives signals.
- 41. This reference model is created to interpret network communication.
- 43. This command in the Linux system is used to search for text.
- 49. Uses TCP port 22 for remote access.
- 50. This transport layer protocol is used when speed is the main concern.
- 52. This device interconnects multiple networks to each other.
