Upgrade to remove ads
EXAM 70-687 Configuring Windows 8 - Lesson 17
Key Terms lesson 17
Terms in this set (15)
Located on the domain controller, used to manage domain users accounts
The process of verifying that the identity of the person operating the computer is the same as the user account the person is employing to gain access.
The process of granting an authenticated user a specific degree of access to specific computer or data resources.
a mathematical process, in which a software program tries all of the possible passwords until it finds the right one.
a collection of logical objects that represent various types of network resources, such as computers, applications, users, and groups.
a collection of computers that all utilize a central directory service for authentication and authorization.
at least one Windows server with the Active Directory Domain Services (AD DS) role installed.
entity that Windows uses to represent a collection of users.
a simplified networking paradigm that enables users connected to a home network to share the contents of their libraries without the need for creating user accounts and permissions.
Authentication method that uses two or more of the following: Something the user knows (password), has (smart card) , or is (biometrics, fingerprint, retina, facial features)
pass -through authentication
a user has accounts with the same name and password on multiple workgroup computers, then the authentications occur automatically, with no user intervention.
Personal Identity Verification (PIV)
published by the National Institute of S1tandards and Technology (NIST). Windows can now obtain drivers for smart cards
Specific operating system tasks, such as Shut Down the System or Allow Log On Through Remote Desktop Services, which can only be performed by certain users designated by a system administrator.
Windows Biometric Framework
provides a core biometric functionality and a Biometric Device control panel
a collection of computers that are all peers.
This set is often in folders with...
EXAM 70-687 Configuring Windows 8 - Lesson 18
EXAM 70-687 Configuring Windows 8 - Lesson 15
EXAM 70-687 Configuring Windows 8 - Lesson 16
EXAM 70-687 Configuring Windows 8 - Lesson 14
You might also like...
Windows 7 Configuration 70-680 CH9
98-367 Chapter 2 Lesson 2: Authentication, Authori…
CSV Ch 9
Introducing Windows Server 2012/R2 Key Terms
Other sets by this creator
Ethical Hacking and Network Security - Ch 13 - Net…
Ethical Hacking and Security - Chapter 12 - Crypto…
Hands on Ethical Hacking and Network Defense Ch 11…
A+ Guide to Hardware Chapter 4