Shana Jackson 12/02/2024

12345678910111213141516171819
Across
  1. 2. A document that describes the rules governing access to an organizations information resources, enforcement of these rules and steps taken if rules are breached.
  2. 4. is a series of letters, numbers and special characters that
  3. 6. A Server role that makes it possible for administrators to take control of Microsoft product updates.
  4. 8. Someone who wants to send encrypted data must apply for a _____ from a certification Authority.
  5. 10. Backup only backs up files that have changed since the last full backup.
  6. 11. Attackers who dont report problems but instead disseminate the information.
  7. 15. Allows passwords of 128 characters.
  8. 16. sell cetificates to companies that want to have secure communications sessions across public networks.
  9. 17. Enables administrators to control who has access to the network.
  10. 19. a Framework for other protocols that provide encryption and authentication.
Down
  1. 1. Passwords policies for a single window computer can be set in the local secirity policy console found in ____
  2. 3. ____ Firewall creates a barrier between networks so that potentially harmful packets cant enter or leave the protected networks.
  3. 5. Creates a barrier between two entitles.
  4. 6. Testers who are paid to probe network and report vulnerablities.
  5. 7. Requires a user to supply 2 or more types of authentication.
  6. 9. What users can do after they are logged on to the network.
  7. 12. used in a windows domain enviroment and provides mutual authentication.
  8. 13. An industry standard client protocol that offers centralizes control.
  9. 14. The most widely used method for encrypting data is______
  10. 18. prevents people from using eavesdropping Technology.