• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/31

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

31 Cards in this Set

  • Front
  • Back

Multifactor Authentication

Two sources of authentication such as a smartcard and password.

The most common user identifier on Windows networks are:

passwords

Cracking

the process of repeatedly guessing passwords until you find the right one.

Brute force

is a mathematical process in which as software program tries all o the possible passwords until it finds the right one.

Social Engineering

Intruder tried to dupe the user into supplying the password.

Credential Manager

It is a Windows 7 tool that stores the usernames and passwords people supply to servers and Web sites in a protected area called the Windows Vault.

Smart Card

It is a credit card-like device that contains a chip, on which is stored a digital certificate that serves as an identifier for a particular user.

Passwords are more secure than smart cards.

False

Personal Identity Verification (PIV)

a card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.

Group policy (shortcut keys)

gpedit.msc

Access the Certificates Snap In (Shortcut Login)

certmgr.msc

Windows Vista was the first operating system to use the Windows Biometric Framework.

False; Windows 7

Biometric authentication is theoretically more secure than a token-based or secret based authentication method because the identifying characteristic is difficult or impossible to duplicate.

True

What is the most common problem related to authentication experienced by Windows 7 users is

Password loss

When a user loses a Windows 7 account password, what are his two options:

Reset Disk or reset password through administrator password.

Users rights

Policies that define specific operating system functions.

Malware

malicious software created for the purpose of infiltrating or damaging a computer system without the user's knowledge or consent.

List the effects of malware:

Collect usage information about the computer user.


Display advertisements on the user's system.


Damage or destroy the files stored on the computer.

Action Center

It is a centralized console that enables users and administrators to access, monitor, and configure the various Windows 7 security mechanisms.

Firewall

It is software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others.

Rules

Specifies which packets are allowed to pass through the firewall and which are blocked.

Authentication Exception

Firewall rule requiring IPsec

Filter

It is used to refer to a feature that enables you to display rules according to the profile they apply to, their current state, or the group to which they belong.

Spyware

It is a type of software that gathers information about computer users and transmits it back to the attacker.

Where are two common places where malware is located:

Startup Folder and the Run key in the registry

Windows Defender

It is a Windows 7 application that prevents the infiltration of spyware into the system.

Malicious Software Removal Tool

It is a one time virus scanner program that Microsoft distributes with its monthly updates.

What are two tools that prevent data theft using cryptography?

Bitlocker and EFS

Encrypting File System

Protects users' data by encrypting and decrypting it on the fly as the user works.

Describe how Encrypting File Systems works?

EFS encrypts the files he or she creates using a key generated from the user's public key.


Data encrypted with this key can be decrypted only by the user's personal encryption certificate, which is generated using his or her private key.

There are two main restrictions when implementing EFS:

EFS is a feature of the NTFS file system, so you cannot use EFS on FAT drives.



You cannot use EFS to encrypt files that have already been compressed using NTFS compression.