Across
- 2. A document that describes the rules governing access to an organizations information resources, enforcement of these rules and steps taken if rules are breached.
- 4. is a series of letters, numbers and special characters that
- 6. A Server role that makes it possible for administrators to take control of Microsoft product updates.
- 8. Someone who wants to send encrypted data must apply for a _____ from a certification Authority.
- 10. Backup only backs up files that have changed since the last full backup.
- 11. Attackers who dont report problems but instead disseminate the information.
- 15. Allows passwords of 128 characters.
- 16. sell cetificates to companies that want to have secure communications sessions across public networks.
- 17. Enables administrators to control who has access to the network.
- 19. a Framework for other protocols that provide encryption and authentication.
Down
- 1. Passwords policies for a single window computer can be set in the local secirity policy console found in ____
- 3. ____ Firewall creates a barrier between networks so that potentially harmful packets cant enter or leave the protected networks.
- 5. Creates a barrier between two entitles.
- 6. Testers who are paid to probe network and report vulnerablities.
- 7. Requires a user to supply 2 or more types of authentication.
- 9. What users can do after they are logged on to the network.
- 12. used in a windows domain enviroment and provides mutual authentication.
- 13. An industry standard client protocol that offers centralizes control.
- 14. The most widely used method for encrypting data is______
- 18. prevents people from using eavesdropping Technology.
