Across
- 4. settings dynamically change depending on the type of network
- 6. releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
- 10. opens Microsoft Management Console.
- 12. a dynamic disk that is corrupted, turned off, or disconnected.
- 14. a basic or dynamic disk that has experienced hardware failure, corruption, or I/O errors.
- 17. opens the System Information window, which shows a summary of system components, including hardware components and software information.
- 19. This is used to create customized system image files that will be installed on computers in the enterprise.
- 23. The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
- 25. a command-line terminal emulation protocol and program that works over port 23.
- 26. a specific monitor can be specified.
- 28. opens the Remote Desktop utility.
- 29. displays the Group Policy settings that are in effect for a currently logged in user.
- 31. a user complains about receiving frequent notifications about applications that are making changes to the computer.
- 32. a disk that does not contain a valid signature.
- 35. a volume that is functioning properly.
- 37. This tab shows all running processes. From this tab, you can end processes or set process priorities.
- 40. A key that when pressed displays a list of commands previously entered.
- 42. A powerful command that provides options for how files are copied.
- 43. a basic or dynamic disk that is accessible and shows no problems.
- 44. a dynamic disk that has been moved to a computer from another computer running Windows.
- 45. This tab shows the usage of all network adapters.
- 46. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
- 47. An elderly user complains that the text in the menus in applications is difficult to read.
- 49. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
- 52. New software was configured on a computer. The user is complaining that the computer now locks up frequently. You want to start troubleshooting by booting the computer with a minimal configuration.
- 53. Allows files and applications that require higher user privileges to be opened.
- 54. landscape or portrait.
- 55. forces a DHCP client to renew its DHCP address lease from the DHCP server.
Down
- 1. This tab shows all running applications. From this tab, you can create, switch to, or close any applications that have stopped responding using the buttons at the bottom.
- 2. displays the DNS resolver cache, which contains host and domain names that have been recently queried.
- 3. a new employee will be sharing a computer and requires an account.
- 5. provides very weak security and should not be relied upon for confidentiality
- 7. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
- 8. removed from new versions of windows 10 and easily shares files.
- 9. Private network that connects remote sites or users together over a public network, like the internet.
- 11. These are identified with a dollar sign at the end of the share name.
- 13. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
- 15. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
- 16. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
- 18. This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
- 19. Displays details for all DirectX components and drivers that are installed in a computer.
- 20. The command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
- 21. a basic disk that is being converted into a dynamic disk.
- 22. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
- 24. I/O errors detected on a dynamic disk.
- 27. This is used to update a local machine and verify that the machine is getting Group Policy updates.
- 30. This tab shows all users that are logged on the computer.
- 33. clears the DNS resolver cache on the host.
- 34. Allows an administrator to view or make changes to the Windows Registry. Can only be opened through search or command prompt.
- 36. a dynamic disk that is corrupted or unavailable.
- 38. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties.
- 39. displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name
- 41. reset browser settings to default and clear browsing history.
- 48. This tab shows the CPU and page file usage.
- 50. You are finding that security issues are becoming a big part of your daily duties. You would like to assemble a group of tools that you can easily access to address security issues.
- 51. the command that is used to query the DNS server to discover IP addresses or host names
