Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

aplus chapter 20

terms

QuestionAnswer
administrative shares shared by default on a network that administrators accounts can access
anonymous users thoses users who have not been authenticated on a remote computer
authenticated users group includes all user accounts that can access the system except the guest account
certificate manager console used to manage digital certificates.you can install or backup a certificate
everyone group included the authenticated users group as well as the guest account
hidden share a folder whose name ends with a $ and does not appear in the network window
inherited permissions attained from a parent object
local shares folders on a computer that are shared with others on the network using a folders properties box
two limitations of efs encryption windows system files cant be encrypted recovery key is stored on the local computer
permission propagation permissions are passed from parent to child
quarantined computer suspected of infection and not allowed to use the network
quarantined file suspected of infected file and is placed in a special directory and cannot be opened
share permissions allowing access to folders to remote users on the network
simple file sharing you have no control over who has access to a shared file or folder
virus encyclopedia database ov viruses kept on the internet
virus signatures a set of distinguishing characteristics of a virus used by antivirus software to identify the virus
windows encrypyed file system a way to use a key to encode a file or folder on an ntfs volume to protect sensitive data,transparent to users and applications
bit locker encryption used to lock down a hard drive by encrypting the entire volume and any other volume on the drive
self signed certificate system signs the certificate
fat file system cannot use file or folder encryption
self signed certificate contain sthe public key needed to decrypt the file or folder
when you first encrypt a file need to create a backup copy of the certificate and the private key
backup certifcate exported certificate
three ways to use bitlocker encryption computer authentication, user authentication,computer and user authentication
bitlocker encryption key startup key
tpm chip holds bitlocker encryption key
supervisor password required to change bios setup
user password required to use the system or view bios setup
drive lock password required to access the hard drive
tpm chip tpm.msc
installing bitlocker encryption initializes the tpm chip
heuristic scanning hit or miss inaccurate scanning
heuristic scanning av software scans for unknown viruses by looking for suspicious activity typical of what viruses generally do
rootkit program that uses unusually complex methods to hide itself on a system
rootkit this kit of tools was intended to keep a program running at the root level without detection
api call a request from software to the os to access hardware or software using a previously defined procedure
rootkit can run in user or kernel mode
Created by: cgeaski
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards