Across
- 2. A security enhancement. Good for servers that aren't physically secure and for mobile devices like laptops.
- 6. A key that is a series of letters, numbers, and special characters that two devices use to authenticate each other's identity.
- 8. The acronym of the update management system of Windows Server.
- 9. A built-in firewall that Linux distributions have.
- 11. The hat of a hacker who is paid by companies to test their systems and report vulnerabilities.
- 12. An authentication credential category of what the user is. Examples: fingerprint, retina scan, voice pattern.
- 15. What companies must buy if they want to have secure communication sessions across public networks.
- 16. Windows Defender Firewall uses these to affect the behavior of protocols and applications. They can be inbound or outbound.
- 17. This allows an administrator to specify the maximum amount of disk space a user's files can occupy on a volume or share.
- 19. The most widely used method for encrypting data.
- 20. This creates a barrier between two entities.
Down
- 1. A type of file you must edit in Fedora Linux to change password options.
- 3. You use this command on the Linux command line to view files.
- 4. The minimum number of characters Fedora 30 requires for a password. This is by default.
- 5. A security feature that allows administrators to control who has access to their network.
- 7. A type of authentication that requires a user to give two or more types of authentication.
- 10. This is used in a Windows domain environment to provide mutual authentication.
- 13. Security policies should be easy for ordinary users to understand and they should also be?
- 14. Operating Systems require periodic updates and "this" to maintain security, reliability, and performance levels.
- 18. This is a common tool used by Linux administrators. A command-line program.
