Across
- 2. Which element of a security policy describes how users identify themselves to gain access to network resources?
- 4. creates a barrier between networks so that potentially
- 7. only backs up files that have changed since the last full backup
- 13. is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
- 14. Protocol version a mutual authentication protocol
- 15. packets can’t enter or leave the protected networks
- 16. backs up any files that have changed since the last full or incremental backup
- 19. most incoming packets that have been requested
- 20. prevents people from using eavesdropping technology
- 22. used in a Windows domain environment and provides mutual
Down
- 1. creates a barrier between a computer OS and the network
- 3. creates a barrier between two entities
- 5. used by OSs and network devices offer varying levels of secure authentication
- 6. Extensible Authentication Protocol a framework for other protocols
- 8. attackers who do not report problems,
- 9. all of the disk’s contents are backed up as individual folders and files
- 10. a framework for other protocols
- 11. backs up the disk sector by sector to create an exact image of the disk’s contents
- 12. an industry standard client server protocol that offers centralized control
- 17. provide encryption and authentication
- 18. Password Authentication Protocol
- 21. come with a built-in host firewall that is preconfigured to
