CHAPTER 02 CYBER REVIEW

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

NTFS folder Active Directory user Registry key

All use ACL.

certificate chain

Also known as the certification path, is a list of certificates used to authenticate an entity.

Local User Account

A user account that is stored in the Security Account Manager (SAM) database on the local computer.

Asymmetric key

Has one key for encryption and a different key for decryption. Total keys = 2

Domain Controller

Holds a copy of the centralized database used in Active Directory.

Same permissions as the target folder

If you copy a file or folder to a new volume, what permissions will that file or folder have?

Full Control (NTFS Permission)

Needed to change attributes and permissions.

Encryption

Not authentication.

Password reader

Not biometric.

NTFS (New Technology File System)

Offers best security.

Hash Function

One-way encryption using an algorithm and no key.

Key

Password

Nonrepudiation

Prevents one party from denying the actions it has carried out.

Symmetric Encryption

The same key is used to encode and decode, key = 1.

Inherited permissions

They flow from a parent object to a child object.

RADIUS services

Used for centralized authentication, authorization and accounting.

PKI Infrastructure

Used to assign and validate digital certificates.

EFS technology

Used to encrypt an individual file on an NTFS volume.

Ownership

When you cannot access a folder because someone removed the permissions so that no one can access it, you must take ___ of the folder.

SAM

Where local user accounts are found in.

Security Token

A device that may give you a second password to log into a system.

BitLocker To Go

A Windows utility that can encrypt data on a USB flash drive and restrict access by requiring a password.

Group

A collection of list or user/computer accounts.

secure socket layer (SSL) (transport layer security)

A cryptographic system that uses two keys to encrypt data. A public key known to everyone and a private or secret key known only to the recipient of the message.

5 minutes

By default, your computer clock should not be off more than __ or you might have problems with Kerberos authentication.

Authentication

A method for confirming users' identities

digital certificate

A notice that guarantees a user or a website is legitimate

Smart Card

A pocket-sized card with embedded integrated circuits that is used for authentication.

Certificate Revocation List (CRL)

A repository that lists revoked digital certificates.

Personal Identification Number (PIN)

A secret numeric password shared between a user and a system that can be used to authenticate the user to the system.

Member Server

A server that is not running as a domain controller

Access Control List (ACL)

A set of permissions that is attached to an object.

IP Security (IPsec)

A set of protocols developed to support the secure exchange of packets.

Administrative Share

A shared folder typically used for administrative purposes.

syslog

A standard for logging program messages that can be accessed by devices that would not otherwise have a method for communications.

Active Directory

A technology created by Microsoft that provides a variety of network services, including LDAP, Kerberos, DNS-based naming and central location for network administration and delegation authority.

dictionary attack

Attempt to break a password by trying all possible words.

Right

Authorizes a user to perform certain actions on a computer.

Permission

Defines the type of access over an object or the properties of an object such as an NTFS file or printer.

Explicit Permission

Granted directly to a file or folder.

effective permissions

The actual permissions when a user logs in and accesses a file or folder.

Registry

The centralized database that holds most of the Windows configuration.

KERBEROS

The default authentication method used on Microsoft Active Directory.

NTLM (New Technology LAN Manager) hash

The default authentication protocol for Windows NT, that are not a part of a domain, and situations in which you are authenticating to a server using an IP address.

Biometrics

The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting

PDC Emulator

The master time keeper and master for password changes in an Active Directory Domain.

NTFS (New Technology File System)

The preferred file system for today's operating systems.

Authorization

The process of giving someone permission to do or have something

Accounting/Auditing

The process of keeping track of a user's activity while accessing network resources.

single sign-on (SSO)

allows you to log on once and access multiple related but independent software systems without having to log in again.

user account

enables a user to log on to a computer and domain.

brute force attack

the password cracker tries every possible combination of characters

Public Key Infrastructure (PKI)

the system for issuing pairs of public and private keys and corresponding digital certificates


संबंधित स्टडी सेट्स

ATI-Knowledge and clinical judgement(Advanced)

View Set

Community PrepU Module 1 Exam Prep

View Set

Health Assessment Chapter 18 Practice Questions

View Set

Sensation & Perception & Learning Pretest (2/20 - 3/5)

View Set

Chapter 6: Values, Ethics, and Advocacy, Ethical Systems of Healthcare, Healthcare & Ethics, Ch. 6 Values, Ethics, and Advocacy (PrepU), Ethical Healthcare and Genetics

View Set

ACCT3305 Ch9 - Current Liabilities and Contingent Obligations

View Set

Present Simple or Present Continuous?

View Set

Brokerage Exam - Missed Questions

View Set