Per: 2 Chapter 11 - Kahala, M

1234567891011121314151617181920212223242526272829303132
Across
  1. 2. a method for removing restrictions and protections added to mobile operating systems, but typically on iOS devices
  2. 5. Computers that have been commandeered by hackers and unwillingly launch attacks against networks and servers. Also called botnets.
  3. 8. What is the name given to the programming-code patterns of viruses?
  4. 9. a method used on Android devices for removing restrictions and protections added to mobile operating systems
  5. 10. A computer pretends to be a trusted computer to gain access to resources. The computer uses a forged IP or MAC address to impersonate a computer that is trusted on the network.
  6. 12. What is the most effective way of securing wireless traffic?
  7. 15. Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?
  8. 16. a location of the OS that keeps code isolated from other resources and other code
  9. 19. Configured to limit individual or group user access to specific data.
  10. 21. Which Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?
  11. 24. a private network established through a public network to remote sites
  12. 26. a family of free and open-source software operating systems based on an operating system kernel
  13. 29. a navigation system that determines the time and geographical location of the device by using messages from satellites in space and a receiver located on the device
  14. 31. a file hosting service and synchronization service operated by Microsoft
  15. 32. a service in Linux and OS X for scheduling tasks to be executed at specific dates and times
Down
  1. 1. making phone calls using Wi-Fi networks
  2. 3. an operating system based on the Linux kernel and containing a software collection and a package management system
  3. 4. a program that interprets the commands from the keyboard and passes them to the operating system
  4. 6. Disrupts or eliminates the magnetic field on a hard drive that allows for the storage of data.
  5. 7. Also known as secure erase, is a procedure performed to permanently delete data from a hard drive.
  6. 11. a cloud service provided by Apple for iOS amd OS X devices
  7. 13. an open source, Linux based smartphone/tablet operating system
  8. 14. A denial of service attack launched from multiple infected PCs called zombies or botnets. The intent is to obstruct or overwhelm access to the targeted server.
  9. 17. a backup tool in OS X
  10. 18. Computers that have been commandeered by hackers and unwillingly launch attacks against networks and servers. Also called zombies.
  11. 20. Which type of attack involves the misdirection of a user from a legitimate web site to a fake web site?
  12. 22. A document that outlines procedures regarding physical security, and the protection of data, research and development, and customer information.
  13. 23. a monitoring system included in computer hard disk drives to detect and report drive status
  14. 25. a cloud service developed by Google to provide file storage and synchronization service
  15. 27. a closed source Unix based operating system for smartphones and tablets made by Apple
  16. 28. What is the minimum level of Windows security required to allow a local user to restore backed up files?
  17. 30. a feature of a computer system that allows booting from more than one operating system