Term
|
Definition
____________ is the process by which you determine a person at your computer is who he says he is. |
|
|
Term
|
Definition
____________ is the process that states what a user can and cannot do on that system. |
|
|
Term
Principle of Least Privilege |
|
Definition
____________is a good security practice to determine what type of user account to give to a specific person. |
|
|
Term
Users and Passwords / Control Panel |
|
Definition
____________in Windows 2000 is one handy tool for managing users. This tool is accessed from the ____________. |
|
|
Term
"User must enter a username and password to use this computer" |
|
Definition
____________ needs to be checked in order for the user to enter a username and password in the system. |
|
|
Term
"User must enter a username and password to use this computer" |
|
Definition
Make sure the ____________ is turned on. Not having it on is a bad thing!. |
|
|
Term
|
Definition
To create and manage users, you must be logged on as the ____________, to be a member of the Administrators group, or have an administrator account. |
|
|
Term
|
Definition
____________ is an account that only belongs to the Local Users group. |
|
|
Term
|
Definition
If the ____________ checkbox is check, then Windows brings up the friendly Welcome Screen. |
|
|
Term
|
Definition
In Windows Vista Ultimate, ____________ is listed under User Accounts. |
|
|
Term
Setup parental controls for any user and Add or remove user accounts |
|
Definition
In Windows Vista Home Premium, ____________ shows up under User Accounts and Family Safety. |
|
|
Term
|
Definition
____________ is a feature that enables standard uses to do common tasks and provides a permissions dialog when standard users and administrators do certain things that could potentially harm the computer. |
|
|
Term
|
Definition
With ____________you can monitor and limit the activities of any Standard User in Windows Vista. |
|
|
Term
|
Definition
Using ____________ characters makes any password much more difficult to crack. |
|
|
Term
|
Definition
Some password crackers use combinations of common ____________ to try to hack a password. |
|
|
Term
|
Definition
A ____________ is simply a collection of accounts that share the same access capabilities. |
|
|
Term
Administrators, Power Users, Users, Backup Operators, Replicator, Everyone, and Guests |
|
Definition
____________ are the seven built-in groups in Windows 2000. |
|
|
Term
|
Definition
When installed as a standalone PC or connected to a workgroup but not a domain, run in a specialized networking mode called____________ |
|
|
Term
Distributed COM Users and Event Log Readers, Performance Log Users, and Performance Monitor Users |
|
Definition
_____, _____, _____, and ______ are other groups that Windows Vista also runs on top of what is already used from Windows 2000. |
|
|
Term
Local Users and Groups Tool / Computer Management |
|
Definition
____________________enables you to add new groups to your computer in the Professional versions of 2000, XP, Vista, and Windows 7 which is found in the _____ applet of Administrative Tools. |
|
|
Term
|
Definition
Defines exactly what a particular account can or cannot do to the file or folder. |
|
|
Term
Ownership, Take Ownership Permission, Change Permission, Folder Permissions, and File permission |
|
Definition
What are the 5 NTFS permissions? |
|
|
Term
Full Control, Modify, Read & Execute, List Folder Contents, Read, and Write |
|
Definition
What are the 6 standard permissions for a folder. |
|
|
Term
Full Control, Modify, Read & Execute, Read, and Write |
|
Definition
What are the 5 file permissions? |
|
|
Term
|
Definition
Copying within a partition creates two copies of the object. The object in the original location _____ its permissions, unchanged. The copy of the object in the new location _____ the permissions from the new location. |
|
|
Term
|
Definition
Moving within a partition creates one copy of the object. That object _____ its permissions, unchanged. |
|
|
Term
|
Definition
Moving from one NTFS partition to another creates two copies of the object. The object in the original location _____ its permissions, unchanged. The copy of the object in the new location _____ the permissions from the new location. |
|
|
Term
|
Definition
Moving from one NTFS partition to another creates one copy of the object. The object in the new location _____ the permissions from that new location. |
|
|
Term
|
Definition
Copying from an NTSF-based partition to a FAT or FAT 32 based partition creates two copies of the object. The object in the original location _____ its permissions, unchanged. |
|
|
Term
|
Definition
Moving from an NTFS-based partition to a FAT or FAT 32 based partition creates one copy of the object. That object has __________. |
|
|
Term
|
Definition
With __________, you essentially have one local sharing option and that’s to put anything you want to share into the Shared Documents. |
|
|
Term
Windows XP Home and Windows Media Center |
|
Definition
__________ and __________only give you the simple file sharing. |
|
|
Term
Tools | Folder Options | View Tab | Use simple file sharing and deselect it. |
|
Definition
To turn off file sharing, My Documents go to __________. |
|
|
Term
Right-click on it and select share |
|
Definition
To share a folder or file in Vista, __________. |
|
|
Term
|
Definition
The __________ offers another way to share files and folders. |
|
|
Term
Public Documents, Public Downloads, Public Music, Public Pictures, and Public Videos |
|
Definition
In Vista the Public Folders are__________, __________, __________, __________, and __________. |
|
|
Term
Shares, Sessions, and Open Files |
|
Definition
The computer management console in the Administrative Tools has a Shard Folder option under System Tools. In that are three options. _____, _____, and _____. |
|
|
Term
|
Definition
The _____ symbol is used with administrative shares. |
|
|
Term
|
Definition
BitLocker requires a special _____ chip on the motherboard to function. |
|
|
Term
Double-Click the BitLocker Drive Encryption icon in the Classic Control Panel |
|
Definition
To enable BitLocker, __________. |
|
|