• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/31

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

31 Cards in this Set

  • Front
  • Back

access token

Created when a user logs on, this value identifies the user and all of the user’s group memberships. Like a club membership card, it verifies a user’s permissions when the user attempts to access a local or network resource

Anonymous Logon

Special identity that refers to users who have not supplied a username and password

authenticate
To gain access to the network, prospective network users must identify themselves to a network using specific user accounts
authentication
The process of confirming a user’s identity using a known value, such as a password, a pin number on a smart card, or, in the case of biometric authentication, the user’s fingerprint or handprint
authorization
The process of confirming that an authenticated user has the correct permissions to access one or more network resources
batch file

Files, typically configured with either a .bat extension or a .cmd extension that can be used to automate many routine or repetitive tasks

built-in user accounts
The accounts automatically created when Microsoft Windows Server 2008 is installed. By default, two _______ are created on a Windows Server 2008 computer: The Administrator account and the Guest account
Comma-Separated Value Directory Exchange (CSVDE)

The command-line utility used to import or export Active Directory information from a comma-separated value (.csv) file

Comma-Separated Values (CSV)

Format that contains a comma between each value. The_____ format can be used to import and export information from third-party applications

distribution group
Non-security-related groups created for the distribution of information to one or more persons
domain account

The accounts used to access Active Directory or network-based resources, such as shared folders or printers

domain local group
A group used to assign permissions to resources that reside only in the same domain as the ______ . They can contain user accounts, computer accounts, global groups, and universal groups from any domain, in addition to other domain local groups from the same domain.
dsadd

A command-line tool used to create, delete, view, and modify Active Directory objects, including users, groups, and Organizational Units

Everyone
A special identity group that contains all authenticated users and domain guests
global group

A group used to grant or deny permissions to any resource located in any domain in the forest. _____ can contain user accounts, computer accounts, and/or other ______ only from within the same domain as the global group

group
A collection of user or computer accounts that used to simplify the assignment of permissions to network resources
group nesting
The process of configuring one of more groups as members of another group
group scope

Group characteristic that controls which objects the group can contain, limiting the objects to the same domain or permitting objects from remote domains as well, and controls the location in the domain or forest where the group can be used

group type

Group characteristic that defines how a group is to be used within Active Directory

header record

The first line of the imported or exported text file that uses proper attribute names

LDAP Data Interchange Format (LDIF)
The format for the data file containing the object records to be created
LDAP Data Interchange Format Directory Exchange (LDIFDE)

A command-line utility used to import or export Active Directory information and create, modify, and delete Active Directory objects

local account

The accounts used to access the local computer only. They are stored in the local Security Account Manager (SAM) database on the computer where they reside. ______ are never replicated to other computers, nor do these accounts have domain access

local group

A collection of user accounts that are local to one specific workstation or member server. _____ are created in the security database of a local computer and are not replicated to Active Directory or to any other computers on the network

nested
An object placed inside another object of the same type
nested membership
When a group is placed in a second group, the members of the first group become members of the second group
SAM account name

Each user’s login name - the portion to the left of the ‘@’ within a User Principal Name. The ____ must be unique across a domain

Security Account Manager (SAM)
A database containing user accounts and security information that is located on a server
security group
Security-related groups created for purposes of granting resource access permissions to multiple users
special identity group
Group used to define permission assignments. Administrators cannot manually modify the group membership of ____, nor can the view their membership lists
Windows Script Host (WSH)

Allows scripts to be run from a Windows desktop or a command prompt. The runtime programs provided to do this are WScript.exe and CScript.exe, respectively