MODULE 11 QUIZ

12345678910111213141516171819
Across
  1. 1. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
  2. 2. Paid to probe networks and report vulnerabilities
  3. 4. is formed by two devices authenticating their identities via a preshared key, Kerberos authentication, or digital certificates
  4. 6. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  5. 7. is a server role that makes it possible for administrators to take control of Microsoft product updates
  6. 9. a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  7. 11. is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
  8. 15. what the user has (smart card or key)
  9. 17. Do not report problems, but instead disseminate the information to other
  10. 18. what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern
  11. 19. Creates a barrier between two entities
Down
  1. 1. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
  2. 3. a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
  3. 5. features that enable administrators to control who has access to the network authentication
  4. 8. The most widely used method for encrypting data is IP Security
  5. 10. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
  6. 12. What users can do after they are logged on to the network
  7. 13. An industry-standard client/server protocol that offers centralized control
  8. 14. what the user knows (username/password)
  9. 16. A document that enlist the rules about access to an organization’s information resources, enforcement of regulations, and steps taken if rules are breached