• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/27

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

27 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

CaaS

Communication as a Service - this is communication provided by a cloud service provider. For things like voice over IP and VPN services.

Page 122

DaaS

Desktop as a Service - this is a desktop style work space provided by the cloud service provider.

Page 122

IaaS

Infrastructure as a Service - this is the hardware provided by the cloud provider that runs the cloud services either inside or outside the business.

Page 122

MaaS

Monitoring as a Service - the services provided for monitoring the cloud service and to know when things go down.

Page 122

NaaS

Network as a Service - This is basically a virtualisation of all your network needs. So all your servers and things will run from the cloud not a local server device.

Page 122

PaaS

Platform as a Service - this is the platform the basic software that pulls the runs cloud computing. Like the Operating system of the cloud.

Page 122

SaaS

Software as a Service - This is the software provided by the cloud service provider. This is the user interface level of the cloud.

Page 122

Can you compress and encrypt an NTFS folder or file at the same time?

No, You can only do one or the other.

Page 33

When moving an encrypted file from an NTFS file to a non NTFS file does it stay encrypted?

No, the file will become unencrypted due to the new file not supporting that encryption.

Page 33

TPM

Trusted Platform Module - This is a small chip built into a computer that is designed to hold cryptic information such as keys.

Page 33

ReFS

Resilient File System - Its the next file format up from NTFS. It constantly checks for corruption and can move data around to protect it. But it cannot be used to hold system info.

What is Azure RemoteApp?

This is newer software that allows access to Azure apps from outside a network. It can also be used for backups and disaster recovery.

AD FS

Active Directory Federation Services - is when two networks talk to each other on a trusted basis passing a token with claims along with it to save on security steps.

What is a Hyper-V network?

This is cloud based computing solution that is partly hosted by the provider and the customer to make a hybrid of cloud and typical network settings.

What services does Azure supply?

IaaS, PaaS and SaaS. It can provide one or more of these depending if it is a hyper-V system you want or not.

DAC

Dynamic Access Control - This is a way of accessing network services with less authentication. it uses a token and claim system to access other networks. it recognises signature tokens from specific networks.

Page 175-180

DRA

Device Registration Services - This is a service that registers devices on domains. It provides them with a certificate so they can access the network.

Page 172

Security Group Accouts

These Accounts can set up permissions and assign rights to a network. They can also send out messages across the network.

Page 154

Distribution Group Accounts

These are used to distribute messages and services across a network but can't set permissions and assign rights.

Page 154

RMS

Rights Management Service - This is the service that can encrypt sensitive documents and emails. It can also lock the rights to things like changes or deletions.

Page 180

Symmetric Encryption

This is when you have one key to lock and unlock the data.

Page 80

Asymmetric key

This is when you have a key for locking data and a key for unlocking the data.

Page 80

SSL

Secure Socket Layer - this is a service over http that secures data sent over the internet. It uses a public key that anybody has access to to lock the data but it can only be unlocked by the privet key that the receiver has.

Page 81

TLS

Transport Layer Security - This is a community standards set that was created to increase security with internet communication.

Page 82

EFS vs BitLocker

Encryption File System - This encrypts file where as BitLocker Encrypts drives.

Page 82

What file format do optical dicks use?

UDF

What printer permissions is used to manage printing jobs?

Manage Documents - this is the permission used for canceling and reorganising printing jobs.

Page 79