• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
Assign
An option used to deploy required applications to pertinent users and computers.
Basic User
Stategy for enforcing restrictions that prevents any applicationfrom running that requires administrative rights but allows programs to run that only require resources that are accessible by normal users.
certifiicate rule
A software restiction rule that uses the signing certificate of an application to allow software from a trusted source to run or to prevent software that does not come from a trusted source from running. Certificate rules also can be used to run programs in disallowed areas of the operating system.
Disallowed
Strategy for enforcing restictions that prevents all applications from running except those that are specifically allowed.
distribution share
The shared folder that is a network location from which users can download software. Also known as the software distribution point.
file-activated installation
A method of distributing applications whereby an application is installed when a user opens a file associated with an application that does not currently exist.
hash
A series of bytes with a fixed length that uniquely identifies a program or file.
hash algorithm
A formula that generates a hash value.
hash rule
A sotrware-restriction rule applied to an appllication executable that will check the file's hash value and prevent the application from running if the hash value is incorrect.
hash value
A value generated by a formula that makes it nearly impossible for another program to have the same hash.
Install This Application At Logon
A deployment option that allows the application to be installed immediately, rahter than advertising on the Start menu.
.msi file
A relational database file that is copied to the target computer system, with the program files it deploys. In addition to providing installation information, this database file assits in the self-healing process for damaged applications and clean application removal.
network zone rule
A software restiction rule that allows only Windows Installer packages to be installed if they come from a trusted area of the network.
patch files
Windows Installer files with the .msp extension that are used to apply service packs and hotfixes to installed soft
path rule
A software restriction rule that identifies software by specifiying the directory path where the application is stored in the file system.
Publish
1) An option that allows users to access network resoufces by searching the Active Directory database for the desired resource. (See lesson 1).
2) An option used to deploy application. It allows users to install the applications that they consider useful to them. (See lesson 9)
repackaging
The process of preparing software for .msi distribution, which includes taking a snapshot of a clean computer system before the application is installed, installing the application as desired and taking a snapshot of the computer after the application is installed.
self-healing
A function that allows software to detect and correct problems, such as missing or deleted files.
software life cycle
A process that takes place from the time anapplication is evaluated for deployment in an organization until the time when it is deemed old or no longer suitable for use.
Unresticted
Stategy for enforcing restictions that allows all applications to run, except those that are specifically excluded.
.zap file
A non-Windows Installer package that can be created in a text editor.
SDLC
Software Development Live Cycle
A structured process used to develop information systems software, projects, or components; phases include analysis, design, implementation and maintenance.