click below
click below
Normal Size Small Size show me how
aplus chapter 20
terms
| Question | Answer |
|---|---|
| administrative shares | shared by default on a network that administrators accounts can access |
| anonymous users | thoses users who have not been authenticated on a remote computer |
| authenticated users group | includes all user accounts that can access the system except the guest account |
| certificate manager console | used to manage digital certificates.you can install or backup a certificate |
| everyone group | included the authenticated users group as well as the guest account |
| hidden share | a folder whose name ends with a $ and does not appear in the network window |
| inherited permissions | attained from a parent object |
| local shares | folders on a computer that are shared with others on the network using a folders properties box |
| two limitations of efs encryption | windows system files cant be encrypted recovery key is stored on the local computer |
| permission propagation | permissions are passed from parent to child |
| quarantined computer | suspected of infection and not allowed to use the network |
| quarantined file | suspected of infected file and is placed in a special directory and cannot be opened |
| share permissions | allowing access to folders to remote users on the network |
| simple file sharing | you have no control over who has access to a shared file or folder |
| virus encyclopedia | database ov viruses kept on the internet |
| virus signatures | a set of distinguishing characteristics of a virus used by antivirus software to identify the virus |
| windows encrypyed file system | a way to use a key to encode a file or folder on an ntfs volume to protect sensitive data,transparent to users and applications |
| bit locker encryption | used to lock down a hard drive by encrypting the entire volume and any other volume on the drive |
| self signed certificate | system signs the certificate |
| fat file system | cannot use file or folder encryption |
| self signed certificate | contain sthe public key needed to decrypt the file or folder |
| when you first encrypt a file | need to create a backup copy of the certificate and the private key |
| backup certifcate | exported certificate |
| three ways to use bitlocker encryption | computer authentication, user authentication,computer and user authentication |
| bitlocker encryption key | startup key |
| tpm chip holds | bitlocker encryption key |
| supervisor password | required to change bios setup |
| user password | required to use the system or view bios setup |
| drive lock password | required to access the hard drive |
| tpm chip | tpm.msc |
| installing bitlocker encryption | initializes the tpm chip |
| heuristic scanning | hit or miss inaccurate scanning |
| heuristic scanning | av software scans for unknown viruses by looking for suspicious activity typical of what viruses generally do |
| rootkit | program that uses unusually complex methods to hide itself on a system |
| rootkit | this kit of tools was intended to keep a program running at the root level without detection |
| api call | a request from software to the os to access hardware or software using a previously defined procedure |
| rootkit | can run in user or kernel mode |