Across
- 1. , helps to prevent unauthorized access to data on lost or stolen computers by combining
- 3. boot , Measured Boot measures all important code and configuration settings during the boot of Windows.
- 7. , the process responsible for secure logon.
- 9. , linux uses this technique to define the priority of processes
- 10. ,The core of OS and has complete control over everything in the system.
Down
- 2. Network Authentication protocol based on trusted third party to authenticate server and client.
- 4. , processes running in the background, started by the kernel itself.
- 5. , a real-time operating system used in mission-critical applications
- 6. , one method to block buffer overflow attacks
- 8. ,a connection used to exchange data between the processes.
