• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back
Application Compatibility Toolkit (ACT)
For application incompatibilities that are not readily solvable with the Windows 7 compatibility mode settings, Microsoft has released the Application Compatibility Toolkit, a collection of programs that allow administrators to gather information about incompatibilities between specific applications and Windows 7 and create customized solutions that enable those applications to run.
application control policies (AppLocker)
AppLocker, also known as application control policies, is a new Windows 7 (and Windows Server 2008 R2) feature that is essentially an updated version of the concept implemented in software restriction policies. AppLocker also uses rules, which administrators must manage, but the process of creating the rules is much easier, thanks to a wizard‐based interface.
certification authority (CA)
A web server participating in a PKI receives a digital certificate from a certification authority (CA), which contains its public key. The server also generates a private key, which it stores locally.
compatibility fix
A compatibility fix, formerly known as a shim, is a software component that sits between an application and the operating system. The fix translates the function calls that the application makes to the operating system so that the application receives the same responses it would get from an earlier operating system version.
compatibility mode
A collection of compatibility fixes is called a compatibility mode.
Compatibility View
An IE feature which enables the browser to display older pages properly. From the user's perspective, the most easily visible indication of Compatibility View is the broken window icon that appears at the right end of the IE address box.
InPrivate Mode
InPrivate Mode is a new feature of IE 8 that enables you to surf the Internet without leaving any record of your activities. InPrivate Mode consists of the following two technologies:

InPrivate Browsing: Prevents IE from maintaining a permanent record of the user's activities during browsing session.
InPrivate Filtering: Prevents third‐party Web sites from compiling information about an IE user's browsing practices.
phishing
Phishing is a technique that takes social engineering to a mass scale. Instead of convincing‐sounding telephone callers, phishing uses convincing‐looking Web sites that urge users to supply personal information, such as passwords and account numbers.
Program Compatibility Troubleshooter
The Program Compatibility Troubleshooter is a wizard‐based solution that users or administrators can use to automatically configure an executable file to use an appropriate Windows 7 compatibility mechanism. Thus, the troubleshooter is not a compatibility mechanism in itself; it is just a method for applying other mechanisms.
protected mode
Protected mode is an operational state designed to prevent attackers who do penetrate the computer's defenses from accessing vital system components. In Windows 7, Internet Explorer protected mode means that it runs as a low‐integrity procedure. The browser application can therefore write to only low‐integrity disk locations, such as the Temporary Internet Files folder and the standard IE storage areas, including the History, Cookies, and Favorites folders.
public key infrastructure (PKI)
SSL communications are based on a public key infrastructure (PKI), which requires two encryption keys: a public and a private one. Data encrypted using the public key can only be decrypted with the private key, and in the same way, data encrypted with the private key can only be encrypted using the public key.
RSS feeds
Many Web sites that provide frequently changing content, such as news sites and blogs, support a push technology called RSS feeds.
Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL) is the protocol that most Web sites use when establishing secure connections with clients over the Internet. SSL communication is based on the exchange of digital certificates. A digital certificate is a credential, issued by a trusted party, that confirms the identity of the web server and enables the client and the server to exchange encrypted traffic.
security zones
To provide different levels of access to specific applications, Internet Explorer divides the addresses accessible with the web browser into several different security zones, each of which has a different set of privileges. The four zones are: Internet, Local Intranet, Trusted Sites (most elevated), and Restricted (most reduced).
shim
A compatibility fix, formerly known as a shim, is a software component that sits between an application and the operating system.
SmartScreen Filter
Internet Explorer 8 includes a component called the SmartScreen Filter that examines traffic for evidence of phishing activity and displays a warning to the user if it finds any. It is up to the user to recognize the warning signs and to refrain from supplying confidential information to unknown parties.
social engineering
Social engineering is a term that describes any attempt to penetrate the security of a system by convincing people to disclose secret information.
software restriction policies
Software restriction policies are Group Policy settings that enable administrators to specify the programs that are allowed to run on workstations by creating rules of various types
Windows XP Mode
Windows XP Mode is a free download that enables a computer running Windows 7 Professional, Enterprise, or Ultimate edition to create a virtual Windows XP machine on which you can run any native Windows XP application.