Across
- 1. What type of backup – backs up the disk sector by sector to create an exact image of the disk’s contents?
- 4. what policy is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached?
- 7. Most Linux distributions have a built-in firewall called?
- 10. what might be blocked if a computer or server is not communicating with certain applications or services?
- 12. What file must you edit to change password options in Fedora Linux?
- 13. What tool is to delete unneeded files in Windows?
- 14. what is the most widely used method for encrypting data?
- 17. Temporary files (typically located in the \Temp and \Windows\Temp folders) accumulate and should be?
- 18. What memory disk storage is used when there is not enough RAM for a particular operation or for all processes currently in use?
- 19. what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern). WHAT AM I?
- 20. What require periodic maintenance and updates to maintain security, reliability, and performance levels?
Down
- 2. what prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets?
- 3. what the user has (smart card or key). WHAT AM I?
- 5. What type of backup backs up any files that have changed since the last full or incremental backup?
- 6. What type of backup only backs up files that have changed since the last full backup?
- 8. what the user knows (username/password).WHAT AM I?
- 9. What has a built-in firewall that can be accessed through the Security & Privacy app in System Preferences?
- 11. is a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity. WHAT AM I?
- 15. what authentication uses keys, but the OS generates the keys?
- 16. A common tool used by many Linux administrators is called?
