click below
click below
Normal Size Small Size show me how
aplus chapter 20
terms
Question | Answer |
---|---|
administrative shares | shared by default on a network that administrators accounts can access |
anonymous users | thoses users who have not been authenticated on a remote computer |
authenticated users group | includes all user accounts that can access the system except the guest account |
certificate manager console | used to manage digital certificates.you can install or backup a certificate |
everyone group | included the authenticated users group as well as the guest account |
hidden share | a folder whose name ends with a $ and does not appear in the network window |
inherited permissions | attained from a parent object |
local shares | folders on a computer that are shared with others on the network using a folders properties box |
two limitations of efs encryption | windows system files cant be encrypted recovery key is stored on the local computer |
permission propagation | permissions are passed from parent to child |
quarantined computer | suspected of infection and not allowed to use the network |
quarantined file | suspected of infected file and is placed in a special directory and cannot be opened |
share permissions | allowing access to folders to remote users on the network |
simple file sharing | you have no control over who has access to a shared file or folder |
virus encyclopedia | database ov viruses kept on the internet |
virus signatures | a set of distinguishing characteristics of a virus used by antivirus software to identify the virus |
windows encrypyed file system | a way to use a key to encode a file or folder on an ntfs volume to protect sensitive data,transparent to users and applications |
bit locker encryption | used to lock down a hard drive by encrypting the entire volume and any other volume on the drive |
self signed certificate | system signs the certificate |
fat file system | cannot use file or folder encryption |
self signed certificate | contain sthe public key needed to decrypt the file or folder |
when you first encrypt a file | need to create a backup copy of the certificate and the private key |
backup certifcate | exported certificate |
three ways to use bitlocker encryption | computer authentication, user authentication,computer and user authentication |
bitlocker encryption key | startup key |
tpm chip holds | bitlocker encryption key |
supervisor password | required to change bios setup |
user password | required to use the system or view bios setup |
drive lock password | required to access the hard drive |
tpm chip | tpm.msc |
installing bitlocker encryption | initializes the tpm chip |
heuristic scanning | hit or miss inaccurate scanning |
heuristic scanning | av software scans for unknown viruses by looking for suspicious activity typical of what viruses generally do |
rootkit | program that uses unusually complex methods to hide itself on a system |
rootkit | this kit of tools was intended to keep a program running at the root level without detection |
api call | a request from software to the os to access hardware or software using a previously defined procedure |
rootkit | can run in user or kernel mode |