Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

TestOut PC Pro Sec 8

Sys Management 2

TermDefinition
Active Directory A Microsoft centralized service that manages users, devices, and network resources for Windows-based networks
Domain An administratively defined collection of network resources that share a common directory database and common security policies
Organizational unit (OU) A container within a directory service that allows you to logically group together related objects like user accounts, computers, or groups
Built-in containers Containers in Active Directory that are created by default and cannot be created, moved, renamed, or deleted.
Object A single entry that represents a resource in Active Directory. Examples: users, groups, computers
Domain controller A Windows server that holds a copy of the Active Directory database.
Group Policy A set of configuration settings that allow the administrator to simultaneously apply multiple settings to multiple objects within the Active Directory domain simultaneously.
Computer Configuration A part of Group Policy Objects (GPOs) that is enforced for the entire computer and is applied when the computer boots.
User Configuration A part of Group Policy Objects (GPOs) that is enforced for specific users.
Account Policy Policy responsible for managing password settings, account lockout settings, kerberos settings.
User Rights A special category of policies that identifies system maintenance tasks and the users or groups who can perform those tasks.
File System Policies Policies category responsible for configuring file and folder permissions that apply to multiple computers.
Group Policy Editor (gpedit.msc) A MMC snap-in administrators can use to manage computer and user configuration local settings.
Logon The process of authenticating to the computer by supplying a user account name and the password associated with that user account.
Permissions A way to control access to files, folders, printers, and to identify what the user can do with the associated object.
Built-in administrator account An account that has all rights and permissions on the computer.
Guest account An account with limited capabilities, usually restricted to logging on, viewing files, and running some programs.
Standard account A basic user account that can browse the internet, run software, access files, and use printers.
Administrators A group that has complete and unrestricted access to the computer, including every system right.
Users A group whose members can use the computer but cannot perform system administration tasks and might not be able to run some legacy applications.
Facial recognition (Windows Hello) Sign-in option that allows a user to set up and sign in using an infrared camera.
PIN (Windows Hello) Sign-in option that allows a user to set up and sign in using a PIN.
Picture Password Sign-in option that allows a user to swipe and tap a photograph to unlock the device.
Single Sign-On (SSO) A feature within Active Directory that allows users to log in once with their credentials and access multiple applications or systems across a network without needing to re-authenticate for each individual application.
User Account Control A security feature in Windows that prevents unauthorized changes to the operating system.
Remote Desktop (RDP) A technology that allows a user to access the graphical desktop of other Windows systems over a network connection.
Microsoft Remote Assistance (MSRA) A technology that allows you to remotely access and fix a computer problem with the help of a trusted person or technology professional.
Secure Shell (SSH) A network protocol used to create a secure Telnet session.
Remote monitoring and management (RMM) A third-party remote access tool that allows to oversee and manage organization's IT infrastructure remotely by monitoring their status and performing maintenance tasks without physically being on-site.
Remote Assistance Designed for providing or receiving help Remote user gains only partial control of the system. User remains logged in during the assistance. The user initiates the session.
Remote Desktop Designed for user productivity. Remote user gains full control of the system. Only one user is logged on at a time. The remote user initiates the session.
Screen Sharing A technology that allows you to share the screen of a macOS system.
Virtual Private Network (VPN) A type of network that uses encryption to securely send IP traffic over the TCP/IP network; supports secure communications over an untrusted network .
Tunneling Protocol A protocol used to send data between two points on a network by encapsulating a data packet within another protocol.
Host-to-host VPN A VPN implementation where two hosts establish a secure channel and communicate directly.
Site-to-site VPN A VPN implementation where routers on the edge of each site establish a VPN with the router at the other location. Individual hosts are unaware of the VPN.
Remote Access VPN A VPN implementation where a server on the edge of a network (called a VPN concentrator) is configured to accept VPN connections from individual hosts in a client-to-site configuration.
Point-to-Point Tunneling Protocol (PPTP) A network protocol used to establish a VPN connection over the internet, uses CHAP and PAP authentication protocols, uses TCP port 1723.
Layer Two Tunneling Protocol (L2TP) An open standard for secure multiprotocol routing that uses IPsec for encryption, not supported by older OS's, uses TCP port 1701 and UDP port 500.
Internet Protocol Security (IPsec) A network security protocol that provides authentication and encryption, can be used in conjunction with L2TP or by itself.
Secure Sockets Layer (SSL) A cryptographic protocol used to secure traffic generated by IP protocols such as HTTP, FTP, and email, uses public key cryptography and digital certificates to authenticate.
Generic Routing Encapsulation (GRE) Tunneling protocol developed by Cisco that allows for the encapsulation of data packets from one network protocol within another.
Operating system updates Type of updates that keeps operating systems current; includes fixes for known bugs, patches for known security risks, and the addition of new features.
Firmware A software embedded in the flash memory of a hardware device.
Windows as a Service Microsoft's strategy of delivering the Windows operating system as a continuously updated service.
Backup An archived copy of data you can use to restore corrupt or lost data in the event of a hardware or system failure.
System state data Type of data that includes the operating system files, the registry, drivers, and configuration files.
User Data Type of data where all data files are modified and saved by users (or applications that users run).
Image Backup Data Type of data that includes everything on a system's hard drive, including the operating system files, applications, and user data.
Incremental backup A backup type that only copies data that has been changed or created since the previous backup activity was conducted.
Differential backup A backup type that copies only the data that has changed since the last full backup.
Grandfather-father-son (GFS) backup A strategy for backing up data in multiple stages, with each stage representing a generation.
3-2-1 backup rule A backup strategy that involves maintaining three copies of the data: two copies are kept onsite, the third copy is kept offsite.
First in first out (FIFO) A backup strategy that works by keeping data for a specific period and then saving over the oldest data once the time has elapsed.
Windows File History Windows built-in tool that automatically backs up files and folders to a storage drive.
The Grandfather Backup A full backup that is completed once a month or so and stored offsite.
The Father Backup A full backup that is completed once a week and stored onsite.
The Son Backup An incremental backup that occurs daily and is kept onsite.
Time Machine The backup program used on macOS.
System Recovery Procedures The sequence of actions taken to restore a failed system to a usable state.
Windows Recovery Environment A set of tools that helps troubleshoot and fix common problems on Windows systems.
System Restore A Microsoft Windows feature that enables you to restore a system to a previous state if System Protection is on
Backup and Restore A tool used to create a full system image of your Windows drive
Startup Repair A built-in Windows utility that scans your PC for problems like missing or damaged system files that might be preventing your computer from starting properly.
System Image Recovery A tool that erases all of the data on your drive and replaces it with an image of Windows, which you must create prior.
POST (Power-On Self Test) A diagnostic process a computer runs immediately after being turned on to check if all its essential hardware components are functioning properly before booting up the operating system.
Boot Loader A program that starts a computer and its operating system.
Wininit.exe and winlogon.exe Critical Windows processes that work together to log users into their computers.
UEFI A newer boot specification that defines the software interface between an operating system and the computer's firmware.
PEI Stage The very first phase of the UEFI boot process, responsible for initializing critical hardware components like the CPU, memory, and chipset.
DXE (Driver Execution Environment) stage An UEFI boot process stage where most of the system initialization occurs, including loading and executing device drivers to configure the hardware components like processor, chipset, and platform components.
Ntbtlog.txt Boot logging file where entries are written to when boot logging is enabled.
Created by: Neilya
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards