• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Application Compatibility Toolkit (ACT)

A collection of programs that enables administrators to gather information about incompatibilities between specific applications and Windows 7, and create customized solutions that enable those applications to run.

application control policies

A new Windows 7 (and Windows Server 2008 R2) feature that is updates the concept implemented in software restriction policies. AppLocker also uses rules, which administrators must manage, but the process of creating the rules is much easier, thanks to a wizard-based interface. Also known as AppLocker.

AppLocker

A new Windows 7 (and Windows Server 2008 R2) feature that is updates the concept implemented in software restriction policies. AppLocker also uses rules, which administrators must manage, but the process of creating the rules is much easier, thanks to a wizard-based interface. Also known as application control policies.

certification authority

A trusted service, whether software or commercial, that issues digital certificates to other entities.

compatibility fix

A software component that sits between an application and the operating system. The fix translates the function calls that the application makes to the operating system so that the application receives the same responses it would get from an earlier operating system version. Also known as a shim.

compatibility mode

A collection of compatibility fixes.

Compatibility View

A feature in Internet Explorer 8 that enables the browser to properly display web pages designed to older standards.

InPrivate Mode

A feature in Internet Explorer 8 that enables users to browse the Internet without leaving behind a history of their activities.

phishing

An information theft technique that uses convincing-looking Web sites to urge users to supply personal information, such as passwords and account numbers.

Program Compatibility Troubleshooter

A wizard-based solution that users or administrators can use to automatically configure an executable file to use an appropriate Windows 7 compatibility mechanism.

protected mode

An operational state that is designed to prevent attackers that do penetrate the computer’s defenses from accessing vital system components.

public key infrastructure (PKI)

A secure communication method that requires two encryptions keys—a public one and a private one. Data encrypted using the public key can only be decrypted with the private key, and in the same way, data encrypted with the private key can only be encrypted using the public key.

RSS feeds

A means of pushing frequently changing content to Internet subscribers. News sites and blogs typically maintain text-based feeds, but it is also possible for an RSS feed to push images, audio, or video content to users.

Secure Sockets Layer (SSL)

A certificate-based security protocol that most computers use when transmitting encrypted data over the Internet.

security zones

A feature of Internet Explorer that divides the addresses accessible with the web browser into different security zones, each of which has a different set of privileges.

shim

A software component that sits between an application and the operating system. The fix translates the function calls that the application makes to the operating system so that the application receives the same responses it would get from an earlier operating system version. Also known as a compatibility fix.

SmartScreen Filter

A feature in Internet Explorer 8 that examines traffic for evidence of phishing activity and displays a warning to the user if it finds any. It is up to the user to recognize the warning signs and to refrain from supplying confidential information to unknown parties.

social engineering

An information theft technique in which an attacker convinces people to disclose secret information. Many attackers have realized that discovering a user’s password by calling the user and asking for it is the simplest method for gaining access to their network.

software restriction policies
Group policy settings that enable administrators to specify the programs that are allowed to run on workstations by creating rules of various types.
Windows XP Mode

A free download that enables a computer running Windows 7 Professional, Enterprise, or Ultimate edition to create a virtual Windows XP machine on which you can run any native Windows XP application.