Across
- 2. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
- 4. Forces a DHCP client to renew its DHCP address lease from the DHCP server.
- 8. the command that is used to query the DNS server to discover IP addresses or host names.
- 10. A command-line terminal emulation protocol and program that works over port 23.
- 12. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
- 16. A feature that enables a user to encrypt all data on a disk drive or removable drive.
- 17. a private network that connects remote sites or users together over a public network, like the internet.
- 21. The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
- 25. Releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address.
- 26. The command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path.
- 27. Released in October 2009.
- 28. Monitors programs on the computer and warns users when an action might present a threat to the computer.
- 29. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
- 30. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
Down
- 1. Displays the DNS resolver cache, which contains host and domain names that have been recently queried.
- 3. contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32.
- 5. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
- 6. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another.
- 7. What is the name for EFS.
- 9. Became available in July 2015.
- 11. These are identified with a dollar sign ($) at the end of the share name.
- 13. This is used to open or execute a file using elevated permission.
- 14. Clears the DNS resolver cache on the host.
- 15. The command that tests basic connectivity between devices by using ICMP echo request and reply messages.
- 18. Provides very weak security and should not be relied upon for confidentiality.
- 19. a group of computers and electronic devices with a common set of rules and procedures administered as a unit.
- 20. Data is sent unencrypted and with no authentication.
- 22. This is the name for GUI.
- 23. Displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name.
- 24. Released in October of 2012.
