Per 2 Chapter 11- Thompson,E

1234567891011121314151617181920212223242526272829303132
Across
  1. 2. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
  2. 5. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
  3. 8. This process creates a file system on a partition to be stored
  4. 9. The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
  5. 10. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
  6. 12. uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
  7. 13. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
  8. 15. These are addresses from a reserved range in the 169.254.x.y network space
  9. 20. Data is sent unencrypted and with no authentication.
  10. 22. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
  11. 23. Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).
  12. 24. displays the DNS resolver cache, which contains host and domain names that have been recently queried
  13. 27. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
  14. 28. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
  15. 29. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
  16. 30. used by most application installation programs to install software. In 32-bit versions of Windows, all programs are 32-bit and are installed in the folder C:\Program Files. In 64-bit systems, 64-bit programs are installed in the folder C:\Program Files, while 32-bit programs are installed in the folder C:\Program Files (x86).
  17. 31. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
  18. 32. Provides features not supported by basic disks
Down
  1. 1. clears the DNS resolver cache on the host
  2. 3. clears the DNS resolver cache on the host
  3. 4. these are identified with a dollar sign ($) at the end of the share name.
  4. 6. The Windows 10 network profile disables file and printer sharing and network discovery on the link. The PC is hidden from the network.
  5. 7. This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
  6. 11. This is used to open or execute a file using elevated permission.
  7. 14. monitors programs on the computer and warns users when an action might present a threat to the computer
  8. 16. releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
  9. 17. the command that is used to query the DNS server to discover IP addresses or host names
  10. 18. a private network that connects remote sites or users together over a public network, like the internet
  11. 19. provides very weak security and should not be relied upon for confidentiality
  12. 21. displays the DNS resolver cache, which contains host and domain names that have been recently queried
  13. 25. contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
  14. 26. a command-line terminal emulation protocol and program that works over port 23