• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
authenticated exception
A firewall rule to allow traffic only when the connection between the communicating computers is secured using IPsec.
brute force
Cracking is a mathematical process in which a software program tries all of the possible passwords until it finds the right one. This is sometimes known as a brute force process.
filter
Although what a firewall does is sometimes referred to as packet filtering, in the Windows Firewall with Advanced Security console, the term filter is used to refer to a feature that enables you to display rules according to the profile they apply to, their current state, or the group to which they belong.
firewall
A firewall is a software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others. Firewalls are essentially packet filters that examine the contents of packets and the traffic patterns to and from the network to determine which packets should be allowed passage through the filter.
malware
Chief among the threats to Windows 7 computers is malicious software created specifically for the purpose of infiltrating or damaging a computer system without the user's knowledge or consent. This type of software includes a variety of technologies, including viruses, Trojan horses, worms, spyware, and adware. The term most commonly used to collectively refer to these malicious software technologies is malware.
multifactor authentication
Because each of these identification methods has inherent weaknesses, networks requiring high security often use more than one. For example, a network that issues smart cards to users nearly always requires some sort of password as well. This technique is known as multifactor authentication.
Personal Identity Verification (PIV)
Windows has supported smart card authentication for some time, but until Windows 7, you had to install a third‐party device driver along with the card reader hardware. By including support for the Personal Identity Verification (PIV) standard, published by the National Institute of Standards and Technology (NIST), Windows 7 can now obtain drivers for PIV smart cards from Windows Update, or use a PIV minidriver included with the operating system.
private key
As the user works, EFS encrypts the files he or she creates using a key generated from the user's public key.
public key
Data encrypted with this key can be decrypted only by the user's personal encryption certificate, which is generated using his or her private key.
rules
To filter traffic, firewalls use rules that specify which packets are allowed to pass through the firewall and which are blocked.
spyware
Spyware is a type of software that gathers information about computer users and transmits it back to the attacker.
user rights
In Windows 7, user rights are policies that define specific operating system functions. For example, in order to sit down at a Windows 7 computer and log on, users must not only have accounts, they also must possess the Allow log on locally user right.
Windows Biometric Framework
Prior to Windows 7, the operating system included no support for biometric devices at all, and required the third‐party vendor to supply a complete software solution along with the hardware. However, Windows 7 includes a new component called the Windows Biometric Framework, which provides a core biometric functionality and a Biometric Device control panel.
Something the user knows:
A secret shared between the user and management—usually in the form of a password—is the simplest and most common form of authentication. However, users can forget, share, or otherwise compromise passwords, often without knowing it.
Something the user has:
A token of some kind, carried by the user, such as a smart card, can serve as proof of identity. While tokens can easily be lost or stolen, users are typically aware of the loss, and the time during which the system is compromised is brief.
Something the user is:
Biometric identification is the use of physical characteristics to confirm a user's identity. Fingerprints are the most commonly used biometric identifier, but there are also technologies that are based on ocular scans, facial recognition, and other characteristics.