Upgrade to remove ads
EXAM 70-687 Configuring Windows 8 - Lesson 12
Lesson 12 - Key Terms
Terms in this set (19)
Advanced Encryption System (AES)
Implemented in the WPA2 standard, AES uses a difererent and more secure encryption algorithm, called CCMP.
a feature that enables you to display rules according to the profile they apply to, their current state, or the group to which they belong.
a software program or hardware device that protects a computer by allowing certain types of network traffic in and out of the system while blocking others.
IP Security (IPsec)
a collection of documents that define a method for securing data while it is in transit over a TCP/IP network
Malicious Software Removal Tool
single user virus scanner that is updated monthly by Microsoft
malicious software created specifically for the purpose of infiltrating or damaging a computer system without the user's knowledge or consent includes a variety of technologies, including viruses, Trojan horses, worms, spyware, and adware
multiple·input multiple-output (MIMO)
format has two transmitters and two receivers, operating at different frequencies
specify which packets are allowed to pass through and which are blocked.
shared secret/shared key
security setting used to decrypt wep protected wireless transmissions
The sending system splits its data into two signals for transmission, and the receiving device reassembles the signals into a single data stream.
has to be running all the time, so the installer typically places the program in one of the standard Windows preloading mechanisms, such as the Startup folder and the Run key in the registry.
data packets are encapsulated within other packets for their protection.
Temporal Key Integrity Protocol (TKIP)
Implemented in the original WPA standard, it encrypts data using the RC4 algorithm with a 128-bit key. Same as WEP but uses unique encryption key for each packet eliminating WEP most exploited weakness
real-time monitoring, which attempts to prevent spyware from infiltrating the computer as it is installed. has a set of predefined definitions that it searches for in these places, which help it to identify specific threats.
Wi·Fi Protected Access (WPA and WPA2)
virtually all currently manufactured wireless devices support them. More secure than WEP, so they are preferable
Wired Equivalent Privacy (WEP)
a security protocol that helps protect transmitted information by using a security setting, called a shared secret or a shared key, to encrypt network traffic before sending it
Also known as WPA-802.1X or WPA-RADIUS, requires an authentication server using Remote Authentication Dial-In User Service (RADIUS) and the 802.1X authentication protocol, as implemented in the Network Policy and Access Services role in Windows Server 2008 R2. provides centralized administration, auditing, and logging, and eliminates the need for a shared passphrase, which is a potential vulnerability.
Also known as WPA-PSK or preshared key mode. Only wireless devices with the passphrase can join the network
rule to allow traffic only when the connection
benveen the communicating computers is secured using IPsec.
THIS SET IS OFTEN IN FOLDERS WITH...
EXAM 70-687 Configuring Windows 8 - Lesson 10
EXAM 70-687 Configuring Windows 8 - Lesson 11
EXAM 70-687 Configuring Windows 8 - Lesson 13
EXAM 70-687 Configuring Windows 8 - Lesson 14
YOU MIGHT ALSO LIKE...
semester 4 chap 6
BPA Computer Security
Network Chapter 7
chapter 12 security risks
OTHER SETS BY THIS CREATOR
EXAM 70-687 Configuring Windows 8 - Lesson 18
EXAM 70-687 Configuring Windows 8 - Lesson 17
Ethical Hacking and Network Security - Ch 13 - Net…
Ethical Hacking and Security - Chapter 12 - Crypto…
OTHER QUIZLET SETS
ex phys 2 test
reformation test prep
TCM 221 Chapter 3
NUT Final Exam