Across
- 2. a method for removing restrictions and protections added to mobile operating systems, but typically on iOS devices
- 5. Computers that have been commandeered by hackers and unwillingly launch attacks against networks and servers. Also called botnets.
- 8. What is the name given to the programming-code patterns of viruses?
- 9. a method used on Android devices for removing restrictions and protections added to mobile operating systems
- 10. A computer pretends to be a trusted computer to gain access to resources. The computer uses a forged IP or MAC address to impersonate a computer that is trusted on the network.
- 12. What is the most effective way of securing wireless traffic?
- 15. Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?
- 16. a location of the OS that keeps code isolated from other resources and other code
- 19. Configured to limit individual or group user access to specific data.
- 21. Which Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?
- 24. a private network established through a public network to remote sites
- 26. a family of free and open-source software operating systems based on an operating system kernel
- 29. a navigation system that determines the time and geographical location of the device by using messages from satellites in space and a receiver located on the device
- 31. a file hosting service and synchronization service operated by Microsoft
- 32. a service in Linux and OS X for scheduling tasks to be executed at specific dates and times
Down
- 1. making phone calls using Wi-Fi networks
- 3. an operating system based on the Linux kernel and containing a software collection and a package management system
- 4. a program that interprets the commands from the keyboard and passes them to the operating system
- 6. Disrupts or eliminates the magnetic field on a hard drive that allows for the storage of data.
- 7. Also known as secure erase, is a procedure performed to permanently delete data from a hard drive.
- 11. a cloud service provided by Apple for iOS amd OS X devices
- 13. an open source, Linux based smartphone/tablet operating system
- 14. A denial of service attack launched from multiple infected PCs called zombies or botnets. The intent is to obstruct or overwhelm access to the targeted server.
- 17. a backup tool in OS X
- 18. Computers that have been commandeered by hackers and unwillingly launch attacks against networks and servers. Also called zombies.
- 20. Which type of attack involves the misdirection of a user from a legitimate web site to a fake web site?
- 22. A document that outlines procedures regarding physical security, and the protection of data, research and development, and customer information.
- 23. a monitoring system included in computer hard disk drives to detect and report drive status
- 25. a cloud service developed by Google to provide file storage and synchronization service
- 27. a closed source Unix based operating system for smartphones and tablets made by Apple
- 28. What is the minimum level of Windows security required to allow a local user to restore backed up files?
- 30. a feature of a computer system that allows booting from more than one operating system
