Upgrade to remove ads
EXAM 70-687 Configuring Windows 8 - Lesson 16
Lesson 16 - Key Terms
Terms in this set (16)
Admin Approval Mode
When an administrator attempts to perform a task that requires administrative access, the system switches the account from the standard user token to the administrative token
Basic Input/Output System (BIOS)
built- in software stored on a memory chip on the motherboard, is used to identify the hardware in the computer and preform basic functions such as keyboard control and booting.
responsible for placing the operating system image into memory when the computer is started.
brute force attacks
involve using software that
automatically generates and tries all possible combinations of letters, numbers, and special
characters to attempt to obtain your password
appear only when an application attempts to perform an administrative task.
local security policies
advanced security settings that you configure to either restrict or
allow certain activities on your local computer. The settings can be used to control who can access your computer, whether or not certain actions are recorded in the computer's event logs, and determine the resources users are authorized to access
software installed on your system without your consent.
designed to steal your personal identity information and credentials by luring you to a fake website.
a feature in Internet Explorer designed to keep your computer safe by warning you before you run apps or files from the Internet that are considered to be unsafe.
Unified Extensible Firmware Interface (UEFI)
UEFI is a software technology that is designed as a replacement for the traditional Basic Input/Output System (BIOS) on today's modern motherboards.
User Account Control (UAC)
a Windows 8 feature that prevents unauthorized changes to your computer.
compatibility support module (CSM)
a module that must be disabled so that the computer can boot only UEFI-based operating systems. It locks down the boot process and turns off the legacy BIOS support.
designed to protect your computer against loading malware when booting.
The SmartScreen Filter technology, integrated into the operating system's File Explorer
requests that the user supply the name and pas~word for an account with administrative privileges.
prevents malware from automating a response to the elevation or credential prompt and bypassing the human reply.
This set is often in folders with...
EXAM 70-687 Configuring Windows 8 - Lesson 15
EXAM 70-687 Configuring Windows 8 - Lesson 14
EXAM 70-687 Configuring Windows 8 - Lesson 17
EXAM 70-687 Configuring Windows 8 - Lesson 18
You might also like...
Operating Systems: Chapter 1 - Key Terms
IM 1010 (test out)
computer 101 chapter one terms
Guide to Operating systems 5th edition Chapter 1 K…
Other sets by this creator
Ethical Hacking and Network Security - Ch 13 - Net…
Ethical Hacking and Security - Chapter 12 - Crypto…
Hands on Ethical Hacking and Network Defense Ch 11…
A+ Guide to Hardware Chapter 4
Other Quizlet sets
Bac/Vir- Week 6
14) Ecology: Homeostatic Disruptions
Scripture Ch 12