Upgrade to remove ads
CST MOD 150 UNIT 3 TERMS
Terms in this set (25)
Access Control List (ACL)
The list of permissions granted or denied that is attached to a file or folder.
A series of shares that are automatically created when Windows 7 is first installed. These are useful for administrating remote computers on the network.
Admin Approval Mode
The default action mode of Windows 7, in which all user accounts, even administrative ones, run without administrative privileges until such privileges are required. When this happens, the user is presented with a UAC prompt.
A feature of Windows 7 Enterprise and Ultimate that enables you to encrypt the entire contents of your system or data partition. It is useful for protecting data stored on laptops, which are susceptible to theft.
A new feature of Windows 7 that enables users to rapidly access data from remotely located file and web servers. This enables users at a small branch to cache copies of frequently accessed files from head office servers on a local computer.
A predefined local group that is granted specific rights and privileges on the local computer.
Challenge Handshake Authentication Protocol (CHAP)
An authentication protocol that uses a hashed version of a user's password so that the user's credentials are not sent over the wire in clear text.
A user account that has been granted the authority to decrypt encrypted files.
The information provided by a user or computer to gain access to another network resource. This includes usernames, passwords, certificates, and other personal identification information.
Encrypting File System
An advanced attribute setting of Windows 2000/XP/Vista/7 and Windows Server 2008 R2 for files and folders on an NTFS formatted volume that provides certificate based public key security for those files and folders.
A small group of Windows 7 computers that can exchange shared information easily with each other.
A shared folder that does not broadcast its presence and is not browsable in the network folder. This is indicated by a dollar ($) sign at the end of the folder name.
A condition in which your computer saves everything to the hard disk and then powers down. When you restart your computer, all open documents and programs are restored to the desktop.
Microsoft Forefront Unified Access Gateway (UAG)
A DirectAccess option that provides enhanced security within and outside the corporate network, enabling DirectAccess for IPv4-only applications and resources on the network.
Network Address Protection (NAP)
A feature that protects network resources by requiring that client computers accessing the network from outside provide assurance that they are up-to-date and free of malware. This enables you to ensure that client computers do not spread malware to the internal network.
A set of access restrictions available on hard drives formatted with the NTFS file system. File and folder permissions include Read, Write, List Folder Contents, Read and Execute, Modify and Full Control. These permissions are effective both locally and over the network.
A series of Group Policy settings that determine password security requirements, such as length, complexity, and age.
A series of preconfigured power management options that control actions such as shutting off the monitor or hard disks or placing the computer in sleep mode or hibernation.
A dial-up protocol that supports TCP/IP and IPX/SPX and others with advanced compression and encryption functions.
A piece of data generated by an asymmetric algorithm that's used by the host to decrypt data.
A piece of data generated by an asymmetric algorithm distributed to the public for general use. Used to encrypt data when using EFS..
A program on mobile computers that synchronizes data with other network devices, including servers, desktop computers, and other portable computers.
A default set of capabilities assigned to built-in local groups that defines what members of these groups can and cannot do on the network.
Virtual Private Network (VPN)
A remote access connection technology that uses a protocol such as Point-to-Point Tunneling Protocol or L2TP with IPSec to tunnel through a public network to connect to a private network and maintain a secure connection.
An enhanced task-based command-line scripting interface that enables you to perform a large number of remote management tasks.
This set is often in folders with...
CHULA VISTA CST MOD120 COMPTIA A+ UNIT 2 35 TERMS
CHULA VISTA CST MOD 120 UNIT4 51TERMS
CHULA VISTA CST MOD 130 LINUX UNIT1 TERMS 25
CHULA VISTA CST MOD 130 LINUX UNIT2 TERMS 25
You might also like...
CIS 120 Test 4
CGS 2100 EXAM 2
Other sets by this creator
CST MOD 160 UNIT 4 TERMS
CST MOD 160 UNIT 3 TERMS
CST MOD 160 UNIT 2 TERMS
CST MOD 160 UNIT 1 TERMS
Other Quizlet sets
BSTAT Midterm Rules
epitheal tissue, muscle, connective tiss…
Brynmar study guide pt 3
Class 15: What should we do about the climate?