Per 2 Chapter 11- Rangel , L

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
Across
  1. 4. settings dynamically change depending on the type of network
  2. 6. releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
  3. 10. opens Microsoft Management Console.
  4. 12. a dynamic disk that is corrupted, turned off, or disconnected.
  5. 14. a basic or dynamic disk that has experienced hardware failure, corruption, or I/O errors.
  6. 17. opens the System Information window, which shows a summary of system components, including hardware components and software information.
  7. 19. This is used to create customized system image files that will be installed on computers in the enterprise.
  8. 23. The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
  9. 25. a command-line terminal emulation protocol and program that works over port 23.
  10. 26. a specific monitor can be specified.
  11. 28. opens the Remote Desktop utility.
  12. 29. displays the Group Policy settings that are in effect for a currently logged in user.
  13. 31. a user complains about receiving frequent notifications about applications that are making changes to the computer.
  14. 32. a disk that does not contain a valid signature.
  15. 35. a volume that is functioning properly.
  16. 37. This tab shows all running processes. From this tab, you can end processes or set process priorities.
  17. 40. A key that when pressed displays a list of commands previously entered.
  18. 42. A powerful command that provides options for how files are copied.
  19. 43. a basic or dynamic disk that is accessible and shows no problems.
  20. 44. a dynamic disk that has been moved to a computer from another computer running Windows.
  21. 45. This tab shows the usage of all network adapters.
  22. 46. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
  23. 47. An elderly user complains that the text in the menus in applications is difficult to read.
  24. 49. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
  25. 52. New software was configured on a computer. The user is complaining that the computer now locks up frequently. You want to start troubleshooting by booting the computer with a minimal configuration.
  26. 53. Allows files and applications that require higher user privileges to be opened.
  27. 54. landscape or portrait.
  28. 55. forces a DHCP client to renew its DHCP address lease from the DHCP server.
Down
  1. 1. This tab shows all running applications. From this tab, you can create, switch to, or close any applications that have stopped responding using the buttons at the bottom.
  2. 2. displays the DNS resolver cache, which contains host and domain names that have been recently queried.
  3. 3. a new employee will be sharing a computer and requires an account.
  4. 5. provides very weak security and should not be relied upon for confidentiality
  5. 7. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
  6. 8. removed from new versions of windows 10 and easily shares files.
  7. 9. Private network that connects remote sites or users together over a public network, like the internet.
  8. 11. These are identified with a dollar sign at the end of the share name.
  9. 13. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
  10. 15. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
  11. 16. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
  12. 18. This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
  13. 19. Displays details for all DirectX components and drivers that are installed in a computer.
  14. 20. The command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
  15. 21. a basic disk that is being converted into a dynamic disk.
  16. 22. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
  17. 24. I/O errors detected on a dynamic disk.
  18. 27. This is used to update a local machine and verify that the machine is getting Group Policy updates.
  19. 30. This tab shows all users that are logged on the computer.
  20. 33. clears the DNS resolver cache on the host.
  21. 34. Allows an administrator to view or make changes to the Windows Registry. Can only be opened through search or command prompt.
  22. 36. a dynamic disk that is corrupted or unavailable.
  23. 38. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties.
  24. 39. displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name
  25. 41. reset browser settings to default and clear browsing history.
  26. 48. This tab shows the CPU and page file usage.
  27. 50. You are finding that security issues are becoming a big part of your daily duties. You would like to assemble a group of tools that you can easily access to address security issues.
  28. 51. the command that is used to query the DNS server to discover IP addresses or host names