Across
- 2. what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern)
- 6. A document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached.
- 7. Microsoft Challenge Handshake Authentication Protocol.
- 10. Enable administrators to control who has access to the network.
- 12. A..........creates a barrier between two entities.
- 15. A............creates a barrier between a computer OS and the network.
- 16. The most widely used method for encrypting data.
- 19. ....... testers who are paid to probe networks and report vulnerabilities.
- 20. What users can do after they are logged on to the network.
Down
- 1. Used in a Windows domain environment and provides mutual authentication.
- 3. A....................creates a barrier between networks.
- 4. A good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- 5. By ...... attackers who do not report problems, but instead disseminate the information to other black hat attackers.
- 8. Password Authentication Protocol.
- 9. What the user knows (smart card or key).
- 11. Encrypting File System.
- 13. What the user has (smart card or key).
- 14. Multifactor Authentication.
- 17. Remote Authentication Dial-In User Service.
- 18. Extensible Authentication Protocol.
