Upgrade to remove ads
EXAM 70-687 Configuring Windows 8 - Lesson 15
Terms in this set (17)
Enables administrators to set a storage limit for users of a particular volume.
The combination of Allow permissions and Deny permissions that a security principal receives for a given system element
Tracking events that take place on the local computer.
Access control entry (ACE)
Consists of the security principal and the specific permission assigned to that security principal.
The name of a user, group, or computer being granted permission.
Used to protect files, folders, shares, registry keys, and Active Directory objects.
Control access to files and folders shared over a network.
Control access to the files and folders stored on disk volumes formatted with the NTFS file system.
The tendency of permissions to flow downwards through a file system or other hierarchy.
These are included in the security access token for each user's account and all the groups to which the user belongs.
access control list (ACL)
a colection of individual permissions, in the form of access control entries (ACEs)
permissions that provide the most granular control over the element.
Active Directory permissions
Control access to specific parts of an Active Directory hierarchy. Although Windows 8 cannot host an Active Directory Domain Services domain, desktop technicians might require these permissions when servicing computers that are members of a domain.
Encrypting File System (EFS)
a feature of NTFS that encodes the files on a computer
so that even if an intruder can obtain a file, he or she will be unable to read it.
New Technology File System (NTFS)
the primary Windows file system, is required to implement various security and administrative features in Windows.
Control access to specific parts of the Windows registry. An
application that modifies registry settings or a user attempting to manually modify the
registry must have the appropriate registry permissions
combinations of advanced permissions
THIS SET IS OFTEN IN FOLDERS WITH...
EXAM 70-687 Configuring Windows 8 - Lesson 14
EXAM 70-687 Configuring Windows 8 - Lesson 16
EXAM 70-687 Configuring Windows 8 - Lesson 13
EXAM 70-687 Configuring Windows 8 - Lesson 17
YOU MIGHT ALSO LIKE...
1 - 2.2.4 Module 5 red
Op System Security Ch. 1, 2, 3, 5
Cheesecake M5D1 - Short
OTHER SETS BY THIS CREATOR
EXAM 70-687 Configuring Windows 8 - Lesson 18
Ethical Hacking and Network Security - Ch 13 - Net…
Ethical Hacking and Security - Chapter 12 - Crypto…
Hands on Ethical Hacking and Network Defense Ch 11…