click below
click below
Normal Size Small Size show me how
TestOut PC Pro Sec 8
Sys Management 2
| Term | Definition |
|---|---|
| Active Directory | A Microsoft centralized service that manages users, devices, and network resources for Windows-based networks |
| Domain | An administratively defined collection of network resources that share a common directory database and common security policies |
| Organizational unit (OU) | A container within a directory service that allows you to logically group together related objects like user accounts, computers, or groups |
| Built-in containers | Containers in Active Directory that are created by default and cannot be created, moved, renamed, or deleted. |
| Object | A single entry that represents a resource in Active Directory. Examples: users, groups, computers |
| Domain controller | A Windows server that holds a copy of the Active Directory database. |
| Group Policy | A set of configuration settings that allow the administrator to simultaneously apply multiple settings to multiple objects within the Active Directory domain simultaneously. |
| Computer Configuration | A part of Group Policy Objects (GPOs) that is enforced for the entire computer and is applied when the computer boots. |
| User Configuration | A part of Group Policy Objects (GPOs) that is enforced for specific users. |
| Account Policy | Policy responsible for managing password settings, account lockout settings, kerberos settings. |
| User Rights | A special category of policies that identifies system maintenance tasks and the users or groups who can perform those tasks. |
| File System Policies | Policies category responsible for configuring file and folder permissions that apply to multiple computers. |
| Group Policy Editor (gpedit.msc) | A MMC snap-in administrators can use to manage computer and user configuration local settings. |
| Logon | The process of authenticating to the computer by supplying a user account name and the password associated with that user account. |
| Permissions | A way to control access to files, folders, printers, and to identify what the user can do with the associated object. |
| Built-in administrator account | An account that has all rights and permissions on the computer. |
| Guest account | An account with limited capabilities, usually restricted to logging on, viewing files, and running some programs. |
| Standard account | A basic user account that can browse the internet, run software, access files, and use printers. |
| Administrators | A group that has complete and unrestricted access to the computer, including every system right. |
| Users | A group whose members can use the computer but cannot perform system administration tasks and might not be able to run some legacy applications. |
| Facial recognition (Windows Hello) | Sign-in option that allows a user to set up and sign in using an infrared camera. |
| PIN (Windows Hello) | Sign-in option that allows a user to set up and sign in using a PIN. |
| Picture Password | Sign-in option that allows a user to swipe and tap a photograph to unlock the device. |
| Single Sign-On (SSO) | A feature within Active Directory that allows users to log in once with their credentials and access multiple applications or systems across a network without needing to re-authenticate for each individual application. |
| User Account Control | A security feature in Windows that prevents unauthorized changes to the operating system. |
| Remote Desktop (RDP) | A technology that allows a user to access the graphical desktop of other Windows systems over a network connection. |
| Microsoft Remote Assistance (MSRA) | A technology that allows you to remotely access and fix a computer problem with the help of a trusted person or technology professional. |
| Secure Shell (SSH) | A network protocol used to create a secure Telnet session. |
| Remote monitoring and management (RMM) | A third-party remote access tool that allows to oversee and manage organization's IT infrastructure remotely by monitoring their status and performing maintenance tasks without physically being on-site. |
| Remote Assistance | Designed for providing or receiving help Remote user gains only partial control of the system. User remains logged in during the assistance. The user initiates the session. |
| Remote Desktop | Designed for user productivity. Remote user gains full control of the system. Only one user is logged on at a time. The remote user initiates the session. |
| Screen Sharing | A technology that allows you to share the screen of a macOS system. |
| Virtual Private Network (VPN) | A type of network that uses encryption to securely send IP traffic over the TCP/IP network; supports secure communications over an untrusted network . |
| Tunneling Protocol | A protocol used to send data between two points on a network by encapsulating a data packet within another protocol. |
| Host-to-host VPN | A VPN implementation where two hosts establish a secure channel and communicate directly. |
| Site-to-site VPN | A VPN implementation where routers on the edge of each site establish a VPN with the router at the other location. Individual hosts are unaware of the VPN. |
| Remote Access VPN | A VPN implementation where a server on the edge of a network (called a VPN concentrator) is configured to accept VPN connections from individual hosts in a client-to-site configuration. |
| Point-to-Point Tunneling Protocol (PPTP) | A network protocol used to establish a VPN connection over the internet, uses CHAP and PAP authentication protocols, uses TCP port 1723. |
| Layer Two Tunneling Protocol (L2TP) | An open standard for secure multiprotocol routing that uses IPsec for encryption, not supported by older OS's, uses TCP port 1701 and UDP port 500. |
| Internet Protocol Security (IPsec) | A network security protocol that provides authentication and encryption, can be used in conjunction with L2TP or by itself. |
| Secure Sockets Layer (SSL) | A cryptographic protocol used to secure traffic generated by IP protocols such as HTTP, FTP, and email, uses public key cryptography and digital certificates to authenticate. |
| Generic Routing Encapsulation (GRE) | Tunneling protocol developed by Cisco that allows for the encapsulation of data packets from one network protocol within another. |
| Operating system updates | Type of updates that keeps operating systems current; includes fixes for known bugs, patches for known security risks, and the addition of new features. |
| Firmware | A software embedded in the flash memory of a hardware device. |
| Windows as a Service | Microsoft's strategy of delivering the Windows operating system as a continuously updated service. |
| Backup | An archived copy of data you can use to restore corrupt or lost data in the event of a hardware or system failure. |
| System state data | Type of data that includes the operating system files, the registry, drivers, and configuration files. |
| User Data | Type of data where all data files are modified and saved by users (or applications that users run). |
| Image Backup Data | Type of data that includes everything on a system's hard drive, including the operating system files, applications, and user data. |
| Incremental backup | A backup type that only copies data that has been changed or created since the previous backup activity was conducted. |
| Differential backup | A backup type that copies only the data that has changed since the last full backup. |
| Grandfather-father-son (GFS) backup | A strategy for backing up data in multiple stages, with each stage representing a generation. |
| 3-2-1 backup rule | A backup strategy that involves maintaining three copies of the data: two copies are kept onsite, the third copy is kept offsite. |
| First in first out (FIFO) | A backup strategy that works by keeping data for a specific period and then saving over the oldest data once the time has elapsed. |
| Windows File History | Windows built-in tool that automatically backs up files and folders to a storage drive. |
| The Grandfather Backup | A full backup that is completed once a month or so and stored offsite. |
| The Father Backup | A full backup that is completed once a week and stored onsite. |
| The Son Backup | An incremental backup that occurs daily and is kept onsite. |
| Time Machine | The backup program used on macOS. |
| System Recovery Procedures | The sequence of actions taken to restore a failed system to a usable state. |
| Windows Recovery Environment | A set of tools that helps troubleshoot and fix common problems on Windows systems. |
| System Restore | A Microsoft Windows feature that enables you to restore a system to a previous state if System Protection is on |
| Backup and Restore | A tool used to create a full system image of your Windows drive |
| Startup Repair | A built-in Windows utility that scans your PC for problems like missing or damaged system files that might be preventing your computer from starting properly. |
| System Image Recovery | A tool that erases all of the data on your drive and replaces it with an image of Windows, which you must create prior. |
| POST (Power-On Self Test) | A diagnostic process a computer runs immediately after being turned on to check if all its essential hardware components are functioning properly before booting up the operating system. |
| Boot Loader | A program that starts a computer and its operating system. |
| Wininit.exe and winlogon.exe | Critical Windows processes that work together to log users into their computers. |
| UEFI | A newer boot specification that defines the software interface between an operating system and the computer's firmware. |
| PEI Stage | The very first phase of the UEFI boot process, responsible for initializing critical hardware components like the CPU, memory, and chipset. |
| DXE (Driver Execution Environment) stage | An UEFI boot process stage where most of the system initialization occurs, including loading and executing device drivers to configure the hardware components like processor, chipset, and platform components. |
| Ntbtlog.txt | Boot logging file where entries are written to when boot logging is enabled. |