Across
- 4. a user who has complete control over a machine
- 6. Instructions that tell the cpu how to use external devices.
- 7. What is the oldest digital encoding standard used?
- 8. list directory command in Windows and Linux
- 9. A(n) _____ attack is meant to prevent legitimate traffic from reaching a service.
- 11. Power on self test.
- 13. can do anything to a document, including everything in modify, plus the ability to take ownership of a file and change its ACLs
- 15. A program that interprets text commands and sends them to the OS to execute.
- 16. Linux equivalent to an administrator
- 17. Random Access Memory
- 18. What's commonly done to increase the performance in low-end CPUs?
Down
- 1. To take a relatively complex system and simplify it for our own use
- 2. When cleaning up a system after a compromise, you should look closely for any ______ that may have been installed by the attacker.
- 3. The communication that a computer uses, also known as a base-2 numeral system
- 5. What could potentially decrease the availability of security and also test the preparedness of data loss?
- 6. The very first step of handling an incident is _____ the incident.
- 10. Internet Service provider.
- 12. The ability to diagnose and resolve a problem.
- 14. Plaintext is the original message, while _____ text is the encrypted message.
- 15. DES, RC4, and AES are examples of ______ encryption algorithms.
