Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

aplus chapter 20

terms

QuestionAnswer
administrative shares shared by default on a network that administrators accounts can access
anonymous users thoses users who have not been authenticated on a remote computer
authenticated users group includes all user accounts that can access the system except the guest account
certificate manager console used to manage digital certificates.you can install or backup a certificate
everyone group included the authenticated users group as well as the guest account
hidden share a folder whose name ends with a $ and does not appear in the network window
inherited permissions attained from a parent object
local shares folders on a computer that are shared with others on the network using a folders properties box
two limitations of efs encryption windows system files cant be encrypted recovery key is stored on the local computer
permission propagation permissions are passed from parent to child
quarantined computer suspected of infection and not allowed to use the network
quarantined file suspected of infected file and is placed in a special directory and cannot be opened
share permissions allowing access to folders to remote users on the network
simple file sharing you have no control over who has access to a shared file or folder
virus encyclopedia database ov viruses kept on the internet
virus signatures a set of distinguishing characteristics of a virus used by antivirus software to identify the virus
windows encrypyed file system a way to use a key to encode a file or folder on an ntfs volume to protect sensitive data,transparent to users and applications
bit locker encryption used to lock down a hard drive by encrypting the entire volume and any other volume on the drive
self signed certificate system signs the certificate
fat file system cannot use file or folder encryption
self signed certificate contain sthe public key needed to decrypt the file or folder
when you first encrypt a file need to create a backup copy of the certificate and the private key
backup certifcate exported certificate
three ways to use bitlocker encryption computer authentication, user authentication,computer and user authentication
bitlocker encryption key startup key
tpm chip holds bitlocker encryption key
supervisor password required to change bios setup
user password required to use the system or view bios setup
drive lock password required to access the hard drive
tpm chip tpm.msc
installing bitlocker encryption initializes the tpm chip
heuristic scanning hit or miss inaccurate scanning
heuristic scanning av software scans for unknown viruses by looking for suspicious activity typical of what viruses generally do
rootkit program that uses unusually complex methods to hide itself on a system
rootkit this kit of tools was intended to keep a program running at the root level without detection
api call a request from software to the os to access hardware or software using a previously defined procedure
rootkit can run in user or kernel mode
Created by: cgeaski