• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back

802.1X

A wireless and wired port-based authentication standard offered by the IEEE.

Active Directory Rights Management Services (AD RMS)

A server role that works with client
applications that can take advantage of RMS safeguards. See Rights Management Services (RMS).

Advanced Encryption Standard (AES)

A relatively new standard adopted by the U.S.
government to replace DES and 3DES, and that employs a private-key block-cipher form of
encryption.

assigning applications (or software)

Means an application is automatically represented on
the user’s desktop, for example as a Start menu option or as an icon on the desktop, and which
initially is really a link to a central application distribution server. The fi rst time the user tries
to open the application is the point at which it is fully installed from the distribution server and
can be used from that point on.

BitLocker Drive Encryption

A security measure for protecting hard drives in Windows Vista/7
Enterprise and Ultimate as well as Windows Server 2008. It can use a TPM chip on a computer
or a fl ash drive with a PIN to enforce security. See Trusted Platform Module (TPM).

demilitarized zone (DMZ)

A portion of a network that is relatively less secure because it is
between two networks, such as between a private network and the Internet.

group policy

A set of policies that govern security, confi guration, and a wide range of other
settings for objects within containers in Active Directory.

group policy object (GPO)

An object in Active Directory that contains group policy settings
for a site, domain, OU, or local computer.

Health Registration Authority (HRA)

A server that network clients contact to provide their
Statement of Health (SoH). On the basis of the SoH, the HRA server grants a certifi cate to
enable the client to use network services. See Statement of Health (SoH).

inherited rights

User rights that are assigned to a group and that automatically apply to all members of that group.

IP Security (IPsec)

A set of IP-based secure communications and encryption standards created
through the Internet Engineering Task Force (IETF).

Kerberos

A security system developed by the Massachusetts Institute of Technology to enable
two parties on an open network to communicate without interception from an intruder, by
creating a unique encryption key for each communication session.

publishing applications (or software)

Involves setting up software through a group policy so
that the application is available for users to install from a central distribution server, such as
through the Add/Remove Programs capability via the user’s desktop.

remediation server

A server that can issue updates and security policy changes to a client
computer to bring that client into Network Access Protection (NAP) compliance.

Resultant Set of Policy (RSoP)

A Windows Server 2008 tool that enables you to produce
reports about proposed or current group policy settings for the purpose of planning and
troubleshooting when multiple group policies are in use (such as for OUs and domains).

Rights Management Services (RMS)

Security rights developed by Microsoft to provide
security for documents, spreadsheets, e-mail, and other types of fi les created by applications.

RSA

Developed by Rivest, Shamir, and Adleman, an encryption technique that uses public and
private keys along with a computer algorithm that relies on factoring large prime numbers.

service ticket

In Kerberos security, a permanent ticket good for the duration of a logon session
(or for another period of time specifi ed by the server administrator in the account policies) that
enables the computer to access network services beginning with the Logon service.

Statement of Health (SoH)

Information that a client provides to a Health Registration
Authority (HRA) to enable it to gain access to network services. The information includes
security policy and recent update verifi cation. This is part of Microsoft’s Network Access
Protection (NAP) capabilities. See Health Registration Authority (HRA).

Trusted Platform Module (TPM)

A security specifi cation for a hardware device used to secure
information on another device, such as on a hard drive. The TPM hardware device is typically
a chip.

User Account Control (UAC)

Enables software and device installations in standard user mode
while still ensuring authorization from the administrator. UAC is intended to further remove
these activities from access to the kernel to protect the operating system and make it diffi cult to
destabilize through malware and intrusions.

Windows NT LAN Manager version 2 (NTLMv2)

An authentication protocol used in legacy
Windows NT Server systems and retained in all Windows systems for backward compatibility
for clients that cannot support Kerberos.