Chapter 10 terms

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Windows NT LAN Manager version 2 (NTLMv2)

An authentication protocol used in legacy Windows NT Server systems and retained in all Windows systems for backward compatibility for clients tat cannot support Kerberos

Group Policy Object (GPO)

An object in Active Directory that contains Group Policy settings for a site, domain, OU, or local computer.

Advanced Encryption Standard (AES)

A relatively new encryption standard adopted by the U.S. government to replace DES and 3DES and that employs a private key block cipher form of encryption.

Bitlocker Drive Encryption

A security measure for protecting hard drivers in Windows 7, 8/8.1, and 10 as well as in Windows Server 2016. It can use a TPM chip on the computer or a flash drive with a PIN to enforce security. See Trusted Platform Module (TPM)

account lockout

A security measure that prevents access to a user account, such as after a specified number of unsuccessful logon attempts. Account lockout is often used to prevent brute force attacks that repeatedly try password combinations to attempt to break into an account.

Trusted Platform Module (TPM)

A security specification for a hardware device used to secure information on another device, such as on a hard drive. The TPM hardware device is typically a chip

Kerberos

A security system developed by the Massachusetts Institute of Technology to enable two parties on an open network to communicate without interception from an intruder, by creating a unique encryption key for each communication session.

Active Directory Rights Management Services (AD RMS)

A server role that works with client applications that can take advantage of RMS safeguards. See Rights Management Services (RMS)

IP security (IPsec)

A set of IP based secure communications and encryption standards created through the Internet Engineering Task Force (IETF)

Group Policy

A set of policies that govern security, configuration, and a wide range of other settings for objects within containers in Active Directory.

RSA

Developed by Rivest, Shamir, and Adleman, an encryption technique that uses public and private keys along with a computer algorithm that relies on factoring large prime numbers.

Eomfped Frgrmfrt

Software that scans for and removes viruses, spyware, and malware. Windows Defender is included with Windows Server 2016

inherited rights

User rights that are assigned to a group and that automatically apply to all members of that group.

User Account Control

Enables software and device installations in standard user mode while still ensuring authorization from the administrator. UAC is intended to further remove these activities from access to the kernel to protect the operating system and make it difficult to destabilize through malware and intrusion

service ticket

In Kerberos security, a permanent ticket good for the duration of a logon session (or for another period of time specified by the server administrator in the account policies) that enables the computer to access network services beginning with the Logon service

assigning applications (or software)

Means an application is automatically represented on the user's desktop, for example, as a Start menu option or as an icon on the desktop, and which initially is really a link to a central application distribution server. When the application is assigned to the computer, it is automatically installed when the user boots or signs in to the computer. When assigned to the user account, the first time the user tries to open the application, such as from the Start menu, is the point at which it is fully installed from the distribution server.

Windows Firewall

Windows software that manages incoming and outgoing communications through opening or blocking TCP and UDP communication ports and specific applications to limit the attack surface and thwart attackers and malware

Resultant Set of Policy (RSoP)

A Windows Server 2016 tool that enables you to produce reports about proposed or current Group Policy settings for the purpose of planning and troubleshooting when multiple Group Policies are in use (such as for OUs and domains)

publishing applications (or software)

Involves setting up software through a Group Policy so that the application is available for users to install from a central distribution server, such as through the Programs and Features capability via the user's desktop


संबंधित स्टडी सेट्स

ECON 2302 Final Micro Tanter Tarleton

View Set

CMIS 342 Exam 3 possible questions

View Set

Chapter 42: Nursing Management: Lower Gastrointestinal Problems My Nursing Test Banks

View Set

Ch. 1: Introducing Social Psychology

View Set

Strategic Management Chapter 4 Quiz

View Set