Slande Cheridor

1234567891011121314151617181920
Across
  1. 2. testers who are paid to probe networks and report vulnerabilities
  2. 6. what the user has (smart card or key)
  3. 8. a server role that makes it possible for administrators to take control of Microsoft product updates
  4. 10. The most widely used method for encrypting data
  5. 11. security features that enable administrators to control who has access to the network
  6. 14. an industry-standard client/server protocol that offers centralized control
  7. 15. security features that enable administrators to control what users can do after they are logged on to the network
  8. 16. used in a Windows domain environment and provides mutual authentication
  9. 17. backs up the disk sector by sector to create an exact image of the disk’s contents
  10. 18. framework for other protocols that provide encryption and authentication
  11. 19. A common tool used by many Linux administrators
  12. 20. a good security enhancement for servers that aren’t physically secure
Down
  1. 1. can be set in the Local Security Policy console found in Administrative Tools
  2. 3. allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
  3. 4. tool used to delete unneeded files in Windows
  4. 5. disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  5. 7. a unique biometric identifying trait. What the user is
  6. 9. document that describes the rules governing access to an organization’s information resources
  7. 12. creates a barrier between two entities
  8. 13. prevents people from using eavesdropping technology