• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back
Admin Approval Mode
When an administrator attempts to perform a task that requires administrative access, the system switches the account from the standard user token to the administrative token. This is known as Admin Approval Mode.
authentication
The process of verifying that the identity of the person operating the computer matches that of the user account the person is using to gain access. Typically, to be authenticated, the human user must supply some piece of information associated with the user account, such as a password; demonstrate some personal characteristic, such as a fingerprint; or prove access to an identifying possession, such as a smart card.
authorization
The process of granting an authenticated user a specific degree of access to a specific computer or data resources. In Windows, a user account provides access to permissions that grant the human user access to files and folders, printers, and other resources.
credential prompt
When a standard user attempts to perform a task that requires administrative privileges, the system displays a credential prompt requesting that the user supply the name and password for an account with administrative privileges.
directory service
A directory service is a collection of logical objects that represent various types of network resources, such as computers, applications, users, and groups. Each object consists of attributes that contain information about the object.
domain
A domain is a collection of computers that all utilize a central directory service for authentication and authorization.
domain controller
To create a domain, you must have at least one Windows server with the Active Directory Domain Services (AD DS) directory service installed. This server is called a domain controller.
elevation prompt
Before the system permits the user to employ the administrative token, it might require the human user to confirm that he or she is actually trying to perform an administrative task. To do this, the system generates an elevation prompt.
group
A group is another type of entity that Windows uses to represent a collection of users. System administrators can create groups for any reason and with any name, and then use them just as they would a user account. Any permissions or user rights that an administrator assigns to a group are automatically inherited by all of the members of the group.
mandatory user profile
Mandatory user profile: A roaming profile that users cannot change. Administrators use mandatory user profiles to enforce particular desktop settings for individuals or for a group of users. A fourth variation, called a super‐mandatory profile, requires the user to access the server‐based profile, or the logon fails.
roaming user profile
Roaming user profile: A copy of a local user profile that is stored on a shared server drive, making it accessible from anywhere on the network.
secure desktop
By default, whenever Windows 7 displays an elevation prompt or a credential prompt, it does so using the secure desktop. The secure desktop is an alternative to the interactive user desktop that Windows normally displays. When Windows 7 generates an elevation or credential prompt, it switches to the secure desktop, suppressing the operation of all other desktop controls and permitting only Windows processes to interact with the prompt. The object of this is to prevent malware from automating a response to the elevation or credential prompt and bypassing the human reply.
special identity
Another type of element in Windows 7 (and all other Windows operating systems) is a special identity, which functions like a group. A special identity is essentially a placeholder for a collection of users with similar characteristics. For example, the Authenticated Users special identity represents all of the users that are logged on to the computer at a given instant. You can assign rights and permissions to a special identity just as you would to a group.
User Account Control (UAC)
Microsoft decided to solve these problems by keeping all Windows 7 users from accessing the system using administrative privileges unless those privileges are required to perform the task at hand. The mechanism that does this is called User Account Control (UAC).
user profile
A user profile is a series of folders, associated with a specific user account, that contain personal documents, user‐specific registry settings, Internet favorites, and other personalized information—everything that provides a user's familiar working environment.
user rights
Another user‐based Windows element, completely separate from the permission systems, is called user rights. User rights are specific operating system tasks, such as Shut Down the System or Allow Log On Through Terminal Services, which can only be performed by certain users designated by a system administrator.
workgroup
A workgroup is a collection of computers that are all peers. A peer network is one in which every computer can function as both a server by sharing its resources with other computers, and a client by accessing the shared resources on other computers.
ACL or Access Control List
Stores the authorization status of all users.
User Rights
Task oriented actions. Remote connect, shut down the computer, delete the recycle bin, ect.
Work Group
Easy way to get computers to talk to each other. Found under computer properties it allows small companies to file share without a server. Downside is that you need a logon to every computer that you use, there is no remote user account.
Member of a Domain
Allows users to log onto any machine in that domain, Sends the credentials to a server that verifies that they are allowed on that machine.
Backup Operater
Able to override limits put on there account and allow admin permissions.
Roaming Profiles
If you use 2 different operating systems some of your files may not load properly.
Mandatory Profile
Read only profiles, anything you do will be deleted when you log off.
NTUSER.MAN is read only
NTUSER.DAT is normal profile