Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Vista Ch. 7

QuestionAnswer
____ is a threat to privacy and often makes systems unstable. spyware
A(n) ____ computer is one that has outdated antivirus signatures or is missing security updates unhealthy
To address the risks to data stored on workstations and laptops, ____ has been added to Windows Vista. BitLocker Drive Encryption
Windows Vista includes a(n) ____ policy, which can be used to control many facets of Windows. local security
The local security policy is part of a larger Windows management system called ____, which can be implemented on a local computer, but is typically part of a domain-based network. Group Policy
The ____ policy controls password characteristics for local user accounts. password
Using the ____ policy, you can configure an account to be temporarily disabled after a number of incorrect log-on attempts. account lockout
A ____ rule allows or denies access to software based on the software publisher certificate. certificate
A ____ rule allows or denies access to software based on the filename and location. path
____ is the security process that records the occurrence of specific operating system events in the Security log. auditing
Audit ____ tracks when tasks are performed that require a user rights assignment, such as changing the system time. privilege use
Newer Windows applications use an application ____ to describe the structure of an application. manifest
____ Mode works in conjunction with UAC to prevent malicious software from installing through Internet Explorer. protected
____ is a very organized and deliberate attempt by individuals to steal personal and business information. phishing
____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior. spyware
The most basic level of data security in Windows Vista is ____ permissions. NTFS
____ is the process of taking data and making it unreadable. encryption
A(n) ____ encryption algorithm uses the same key to encrypt data and decrypt data. symmetric
A(n) ____ encryption algorithm uses two keys to encrypt and decrypt data. asymmetric
A(n) ____ encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted. hash
A(n) ____ is part of the motherboard in your computer and is used to store encryption keys and certificates. TPM
Created by: paulysa
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards