Module 11

1234567891011121314151617181920
Across
  1. 6. creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
  2. 8. s a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
  3. 9. is the most widely used method for encrypting data
  4. 12. backs up any files that have changed since the last full or incremental backup
  5. 15. creates a barrier between two entities
  6. 16. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  7. 17. a framework for other protocols that provide encryption and authentication
  8. 19. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
  9. 20. backs up the disk sector by sector to create an exact image of the disk’s contents
Down
  1. 1. all of the disk’s contents are backed up as individual folders and files
  2. 2. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  3. 3. only backs up files that have changed since the last full backup
  4. 4. is used to encrypt files and folders
  5. 5. security features that enable administrators to control who has access to the network and what users can do after they are logged on to the network
  6. 7. security features that enable administrators to control who has access to the network and what users can do after they are logged on to the network
  7. 10. document that describes the rules of an organization
  8. 11. used in a Windows domain environment and provides mutual authentication
  9. 13. requires a user to supply two or more types of authentication
  10. 14. an industry-standard client/server protocol that offers centralized control
  11. 18. is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen