aplus chapter 20 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
administrative shares | shared by default on a network that administrators accounts can access |
anonymous users | thoses users who have not been authenticated on a remote computer |
authenticated users group | includes all user accounts that can access the system except the guest account |
certificate manager console | used to manage digital certificates.you can install or backup a certificate |
everyone group | included the authenticated users group as well as the guest account |
hidden share | a folder whose name ends with a $ and does not appear in the network window |
inherited permissions | attained from a parent object |
local shares | folders on a computer that are shared with others on the network using a folders properties box |
two limitations of efs encryption | windows system files cant be encrypted recovery key is stored on the local computer |
permission propagation | permissions are passed from parent to child |
quarantined computer | suspected of infection and not allowed to use the network |
quarantined file | suspected of infected file and is placed in a special directory and cannot be opened |
share permissions | allowing access to folders to remote users on the network |
simple file sharing | you have no control over who has access to a shared file or folder |
virus encyclopedia | database ov viruses kept on the internet |
virus signatures | a set of distinguishing characteristics of a virus used by antivirus software to identify the virus |
windows encrypyed file system | a way to use a key to encode a file or folder on an ntfs volume to protect sensitive data,transparent to users and applications |
bit locker encryption | used to lock down a hard drive by encrypting the entire volume and any other volume on the drive |
self signed certificate | system signs the certificate |
fat file system | cannot use file or folder encryption |
self signed certificate | contain sthe public key needed to decrypt the file or folder |
when you first encrypt a file | need to create a backup copy of the certificate and the private key |
backup certifcate | exported certificate |
three ways to use bitlocker encryption | computer authentication, user authentication,computer and user authentication |
bitlocker encryption key | startup key |
tpm chip holds | bitlocker encryption key |
supervisor password | required to change bios setup |
user password | required to use the system or view bios setup |
drive lock password | required to access the hard drive |
tpm chip | tpm.msc |
installing bitlocker encryption | initializes the tpm chip |
heuristic scanning | hit or miss inaccurate scanning |
heuristic scanning | av software scans for unknown viruses by looking for suspicious activity typical of what viruses generally do |
rootkit | program that uses unusually complex methods to hide itself on a system |
rootkit | this kit of tools was intended to keep a program running at the root level without detection |
api call | a request from software to the os to access hardware or software using a previously defined procedure |
rootkit | can run in user or kernel mode |
Created by:
cgeaski
Popular Computers sets