Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
52 Cards in this Set
- Front
- Back
An applet for managing users that is available only from the command line. Some options in this applet are not available in other user management utilities.
|
advanced User Accounts applet
|
|
The type of user account that is made a member of the Administrators local group and has full rights to the system.
|
administrator account
|
|
The built-in account that is created during installation and which has full rights to the system. This account cannot be deleted or removed by the Administrators
group. |
Administrator account
|
|
Groups that are automatically created for each Windows 7 computer and stored in the SAM database.
|
built-in local groups
|
|
Domain credentials that are stored in Windows 7 after a user has logged on to a domain. Cached credentials can be used to log on when a domain controller cannot be contacted.
|
cached credentials
|
|
The profile that is copied when new user profiles are created.
|
default profile
|
|
A network where security information is stored centrally in Active Directory.
|
domain-based network
|
|
Allows multiple users to have applications running at the same time. However, only one user can be using the console at a time.
|
Fast user switching
|
|
A part of Parental Controls that is used to limit access to games.
|
game controls
|
|
An account with minimal privileges intended to give minimal access to Windows 7. This account is disabled by default.
|
Guest account
|
|
The account with administrative privileges created during the installation of Windows 7.
|
initial account
|
|
A user account that is defined in the SAM database of a Windows 7 computer. Local user accounts are valid only for the local computer.
|
local user account
|
|
An MMC snap-in that is used to manage users and
groups. |
Local Users and Groups MMC snap-in
|
|
A profile that cannot be changed by users. NTUSER.DAT is renamed to NTUSER.MAN.
|
mandatory profile
|
|
The file containing user-specific registry entries in a user profile.
|
NTUSER.DAT
|
|
A method for configuring time limits, controlling game playing, and allowing or blocking programs.
|
Parental Controls
|
|
A network where all computers store their own security information and share data.
|
peer-to-peer network
|
|
A profile that is merged with all other user profiles. The public profile does not contain an NTUSER.DAT file.
|
public profile
|
|
A user profile that is stored in a network location and is accessible from multiple computers. Roaming profiles move with users from computer to computer.
|
roaming profile
|
|
Adds the requirement to press Ctrl+Alt+Del before logging on.
|
secure logon
|
|
The database used by Windows 7 to store local
user and group information. |
Security Accounts Manager (SAM) database
|
|
A number that is added to the access control list of a resource when a user or group is assigned access.
|
Security Identifier (SID)
|
|
A type of user account that does not have privileges to modify settings for other users. This type of account is a member of the Users local group.
|
standard user account
|
|
A part of Parental Controls that is used to control when users are allowed to log on to the computer.
|
time limits
|
|
User accounts are used for authentication to prove the identity of a person logging on to Windows 7.
|
user account
|
|
A simplified interface for user management in Control Panel.
|
User Accounts applet
|
|
The default logon method for Windows 7. This method presents icons representing each user.
|
Windows Welcome
|
|
A collection of settings, such as lockout duration, that control account lockouts.
|
account lockout policy
|
|
An XML file that describes the structure of an application, including required DLL files and privilege requirements.
|
application manifest
|
|
A new feature in Windows 7 that is used to define which programs are allowed to run. This is a replacement for the software restriction policies found in Windows XP and
Windows Vista. |
AppLocker
|
|
An encryption algorithm that uses two keys to encrypt and decrypt data. Data encrypted with one key is decrypted by the other key.
|
asymmetric encryption algorithm
|
|
The settings that define which operating system events are audited.
|
audit policy
|
|
The security process that records the occurrence of specific operating system events in the Security log.
|
auditing
|
|
A feature in Windows 7 that can encrypt the operating system partition of a hard drive and protect system files from modification. Other partitions can also
be encrypted. |
BitLocker Drive Encryption
|
|
A new feature in Windows 7 that allows you to encrypt removable storage.
|
BitLocker To Go
|
|
An encryption technology for individual files and folders that can be enabled by users.
|
Encrypting File System (EFS)
|
|
The key used to encrypt the VMK when BitLocker Drive
Encryption is enabled. |
Full Volume Encryption Key (FVEK)
|
|
A one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed.
|
hash encryption algorithm
|
|
A set of security configuration options in Windows 7. These options are used to control user rights, auditing, password settings, and more.
|
local security policy
|
|
Malicious software designed to perform unauthorized acts on your computer. Malware includes viruses, worms, and spyware.
|
malware
|
|
Free antivirus software that is available if your copy of
Windows 7 is genuine. |
Microsoft Security Essentials
|
|
A computer authorization system for networks that
prevents unhealthy computers from accessing the network. |
Network Access Protection (NAP)
|
|
A collection of settings to control password characteristics such as length and
complexity. |
password policy
|
|
A command-line tool that is used to apply, export, or analyze security templates.
|
Secedit
|
|
An MMC snap-in that is used to apply, export, or
analyze security templates. |
Security Confi guration and Analysis tool
|
|
An .inf file that contains security settings that can be applied to a computer or analyzed against a computer’s existing configuration.
|
security template
|
|
An encryption algorithm that uses the same key to encrypt and decrypt data.
|
symmetric encryption algorithm
|
|
A motherboard module that is used to store encryption keys and certificates.
|
Trusted Platform Module (TPM)
|
|
A feature in Windows 7 that elevates user privileges only when required.
|
User Account Control (UAC)
|
|
The key used to encrypt hard drive data when BitLocker Drive Encryption is enabled.
|
Volume Master Key (VMK)
|
|
Anti-spyware software included with Windows 7.
|
Windows Defender
|
|
A service that collects and distributes patches to
Windows workstations by using the automatic updates process. |
Windows Server Update Services (WSUS)
|