• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
This is the least restrictive group. They have full control of the computer, the files & folders on it. The LAN, and configured users
Administrators built in group
Set by administrators to log the successs or failure of various events. Can determine if there are too many logon failures, or if someone has changed a policy.
Audit Policies
This group can back up and restore files on the computer, regardless of the permissions
Backup Operators Built in Group
A single msg. is sent to all the hosts on a network or network segment. Used by attackers to disable a network
Broadcast Storm
A drive that has been condensed to take up less space on the hard disk
Compressed Drive
Update that Microsoft deems should be installed promptly
Critical Update
A restriction on users so that they can only use a predetermined amount of hard disk space
Disk Quotas
Created by an Admin. that affects all users on a comp. or in a domain. They are generally set by domain Admin. Specifies how the users desktop looks, wallpapers and how Internet explorer title bar looks
Group Policy
Feature of Wndows XP OS that protects a home or small business network that is connected to the internet. Devices connected to the internet can not use this feature
Internet Connection Firewall (ICF)
This Utility scans computers for common security lapses and than generates individual security reports for each comp. it scans
Microsoft Baseline Security Analyzer (MBSA)
File and Folder permissions that include read, write, list folder contents, read & execute, modify and full control. These permissions are effective both locally and over the network
NTFS Permissions
This is the second least restrictive group. More control than users but less than Admins.
Power Users Built in Group
The process that tests all of the fixes to make sure they do not conflict with each other to cause new problems while fixing old ones
Regression Testing
A unique ID number that identifies each user on a network
Security ID
configured by domain, workgroup ofr system Admins. The policies keep the computer and the computing environment secure by limiting what users can and can not do while logged into the computer or network
Security Policy
Folder permissions that include Read, Change and Full Control. only effective over the network
Share Permissions
These updates contain files that protect the computer from the latest threats, and are part of the virus scanning software's options
Signature Updates
Windows XP enables this by default for home office networks. An esay way to share files
Simple File Sharing
Software used for the client computers to access applications remotely on a network
Terminal Services Client software
Computer program that pretends to be innocent, but instead has a malicious effect
Trojan Horse
The users group is the most secure group and is much more restrictive than ADmins or Power users
Users Built in Group
A network that is constructed by using the internet to connect nodes. These systems use encryption and other security measures to ensure only authorized users have access
Virtual Private Network (VPN)
Online extension of Windows XP that can down;load and install updates
Windows Update
Self replicating computer program similar to a virus. A worm is self contained and does not be part of another program
Worm
a windows 2003 server service that is used to deploy critical updates to computers running Windows 2000 or Windows XP
Software Update Services (SUS)