Per 1 Chapter 11 - Villanueva, M

12345678910111213141516171819202122232425262728293031
Across
  1. 5. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
  2. 12. This tab shows all running applications
  3. 13. This tab shows the usage of all network adapters.
  4. 16. This tab shows the available services, including their operational status
  5. 17. This is used to create customized system image files that will be installed on computers in the enterprise.
  6. 19. created for every account that has been configured on a computer
  7. 20. This tab shows all users that are logged on the computer.
  8. 21. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
  9. 22. This tab shows all running processes.
  10. 24. provides access to the various storage devices available on the computer
  11. 26. To display a list of tasks that are unique to the application,
  12. 27. created for every user by default, provide storage locations for common files and media
  13. 30. a private network that connects remote sites or users together over a public network, like the internet
  14. 31. a command-line terminal emulation protocol and program that works over port 23
Down
  1. 1. These are identified with a dollar sign ($) at the end of the share name.
  2. 2. This tab shows the CPU and page file usage.
  3. 3. To view a thumbnail image of a running program
  4. 4. This tab shows all users that are logged on the computer.
  5. 6. used by most application installation programs to install software
  6. 7. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
  7. 8. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
  8. 9. in this category you can view and configure security settings such as Window Defender Firewall
  9. 10. This is used to open or execute a file using elevated permission.
  10. 11. View the desktop icons that are behind open windows
  11. 14. the command that is used to query the DNS server to discover IP addresses or host names
  12. 15. To add an application to the taskbar for easy access
  13. 18. provides very weak security and should not be relied upon for confidentiality
  14. 23. contains the files that are necessary for the operation of the windows
  15. 25. Minimize all windows that are not being used
  16. 28. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
  17. 29. Resize a window by dragging it to one of the edges of the screen.