IT Support 2023 Crossword Puzzle

123456789101112131415161718
Across
  1. 4. a user who has complete control over a machine
  2. 6. Instructions that tell the cpu how to use external devices.
  3. 7. What is the oldest digital encoding standard used?
  4. 8. list directory command in Windows and Linux
  5. 9. A(n) _____ attack is meant to prevent legitimate traffic from reaching a service.
  6. 11. Power on self test.
  7. 13. can do anything to a document, including everything in modify, plus the ability to take ownership of a file and change its ACLs
  8. 15. A program that interprets text commands and sends them to the OS to execute.
  9. 16. Linux equivalent to an administrator
  10. 17. Random Access Memory
  11. 18. What's commonly done to increase the performance in low-end CPUs?
Down
  1. 1. To take a relatively complex system and simplify it for our own use
  2. 2. When cleaning up a system after a compromise, you should look closely for any ______ that may have been installed by the attacker.
  3. 3. The communication that a computer uses, also known as a base-2 numeral system
  4. 5. What could potentially decrease the availability of security and also test the preparedness of data loss?
  5. 6. The very first step of handling an incident is _____ the incident.
  6. 10. Internet Service provider.
  7. 12. The ability to diagnose and resolve a problem.
  8. 14. Plaintext is the original message, while _____ text is the encrypted message.
  9. 15. DES, RC4, and AES are examples of ______ encryption algorithms.