• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
account lockout policy
A collection of settings, such as lockout duration, that control account lockouts.
application manifest
An XML file that describes the structure of an application, including required DLL files and privilege requirements.
AppLocker
A new feature in Windows 7 that is used to define which programs are allowed
to run. This is a replacement for the software restriction policies found in Windows XP and Windows Vista.
asymmetric encryption algorithm
An encryption algorithm that uses two keys to encrypt and decrypt data. Data encrypted with one key is decrypted by the other key.
audit policy
The settings that define which operating system events are audited.
auditing
The security process that records the occurrence of specific operating system events
in the Security log.
BitLocker Drive Encryption
A feature in Windows 7 that can encrypt the operating system partition of a hard drive and protect system files from modification. Other partitions can also be encrypted.
BitLocker To Go
A new feature in Windows 7 that allows you to encrypt removable storage.
Encrypting File System (EFS)
An encryption technology for individual files and folders that can be enabled by users.
Full Volume Encryption Key (FVEK)
The key used to encrypt the VMK when BitLocker Drive Encryption is enabled.
hash encryption algorithm
A one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed.
local security policy
A set of security configuration options in Windows 7. These options are used to control user rights, auditing, password settings, and more.
malware
Malicious software designed to perform unauthorized acts on your computer. Malware includes viruses, worms, and spyware.
Microsoft Security Essentials
Free antivirus software that is available if your copy of Windows 7 is genuine.
Network Access Protection (NAP)
A computer authorization system for networks that prevents unhealthy computers from accessing the network.
password policy
A collection of settings to control password characteristics such as length and complexity.
Secedit
A command-line tool that is used to apply, export, or analyze security templates.
Security Configuration and Analysis tool
An MMC snap-in that is used to apply, export, or analyze security templates.
security template
An .inf file that contains security settings that can be applied to a computer or analyzed against a computer’s existing configuration.
symmetric encryption algorithm
An encryption algorithm that uses the same key to encrypt and decrypt data.
Trusted Platform Module (TPM)
A motherboard module that is used to store encryption keys and certificates.
User Account Control (UAC)
A feature in Windows 7 that elevates user privileges only when required.
Volume Master Key (VMK)
The key used to encrypt hard drive data when BitLocker Drive Encryption is enabled.
Windows Defender
Anti-spyware software included with Windows 7.
Windows Server Update Services (WSUS)
A service that collects and distributes patches to Windows workstations by using the automatic updates process.